The document proposes a cryptography-based mechanism for detecting misbehavior and controlling trust in opportunistic network systems. It designs a security overlay using cryptography over existing trust-based routing. Spy nodes monitor the network for evidence of malicious nodes. Hop-to-hop authentication uses asymmetric cryptography while end-to-end authentication uses symmetric cryptography. Spy nodes identify suspicious nodes and judges declare them as malicious or normal by decreasing their trust values. The proposed system aims to provide security services like authentication, integrity and confidentiality through cryptography to strengthen security for commercial use of opportunistic networks.
The vampire attack is the class of Denial-of-Service attack. Denial-of-Services in the network is caused by consuming the power of the sensor node. It is also called power draining attacks because of this attack consume the power of sensor nodes and disable the network. It creates a protocol-compliant message and sends it into the network so that the energy used by the network is more than if the same message transmitted of identical size to the same destination.
Black Hole Attack:
A malicious node advertises the wrong paths as good paths to the source node during the pathfinding process.
When the source selects the path including the attacker node, the traffic starts passing through the adversary node and this node starts dropping the packets selectively or in whole.
Black hole region is the entry point to a large number of harmful attacks.
Mobile Ad-Hoc Networks are most usefully in current environments. It’s required high performance, networks load and Throughput. In Mobile Ad-hoc Networks Routing is the hot topic for research. Basically two types routing protocols are work in the mobile Ad-hoc Networks: 1) Proactive and 2) Reactive. Researchers have projected different routing algorithm. Important work has been done on routing in ad hoc networks, some of the important works so far were the destination-sequence distance vector (DSDV) protocol, the temporally ordered routing protocol (TORA), dynamic source routing protocol (DSR) and ad hoc on demand routing protocol (AODV). These algorithms use Open Shortest Path First (OSPF) for find optimum route source to destination.ThesisScientist.com
Neighbor Node Trust Based Intrusion Detection System for WSNHitesh Mohapatra
6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN-2015
Original Authors:Syed Muhammad Sajjada, Safdar Hussain Boukb, Muhammad Yousafa
Available online at www.sciencedirect.com
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
The vampire attack is the class of Denial-of-Service attack. Denial-of-Services in the network is caused by consuming the power of the sensor node. It is also called power draining attacks because of this attack consume the power of sensor nodes and disable the network. It creates a protocol-compliant message and sends it into the network so that the energy used by the network is more than if the same message transmitted of identical size to the same destination.
Black Hole Attack:
A malicious node advertises the wrong paths as good paths to the source node during the pathfinding process.
When the source selects the path including the attacker node, the traffic starts passing through the adversary node and this node starts dropping the packets selectively or in whole.
Black hole region is the entry point to a large number of harmful attacks.
Mobile Ad-Hoc Networks are most usefully in current environments. It’s required high performance, networks load and Throughput. In Mobile Ad-hoc Networks Routing is the hot topic for research. Basically two types routing protocols are work in the mobile Ad-hoc Networks: 1) Proactive and 2) Reactive. Researchers have projected different routing algorithm. Important work has been done on routing in ad hoc networks, some of the important works so far were the destination-sequence distance vector (DSDV) protocol, the temporally ordered routing protocol (TORA), dynamic source routing protocol (DSR) and ad hoc on demand routing protocol (AODV). These algorithms use Open Shortest Path First (OSPF) for find optimum route source to destination.ThesisScientist.com
Neighbor Node Trust Based Intrusion Detection System for WSNHitesh Mohapatra
6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN-2015
Original Authors:Syed Muhammad Sajjada, Safdar Hussain Boukb, Muhammad Yousafa
Available online at www.sciencedirect.com
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Routers play an important role in cyber forensics investigations. During an investigation, an analyst should gather evidence from routers to help determine the source of an attack. This includes examining router logs, configurations, and volatile memory to find artifacts left by attackers. Log files may contain source IP addresses and protocols used. Configurations should be collected but not reset to avoid destroying evidence. Commands like "show access list" and "show users" can provide clues about hacker activity on the router. Properly documenting the chain of custody of all router evidence is crucial for the investigation.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
This document discusses message authentication techniques. It describes message authentication codes (MACs) which use a secret key to generate a code appended to messages to verify authenticity and integrity. Hash functions can also provide authentication but do not use a secret key. HMAC is introduced as a technique that incorporates a secret key into existing hash functions like SHA-1/2 to create a MAC. Digital signatures, which encrypt a hash of a message with a private key, providing both authentication and non-repudiation, are also discussed.
Password sniffing refers to the use of password sniffing programs or software that monitor network traffic to capture and record usernames and passwords as users login to networks. These programs listen to data packets passing through a network and record any instances of passwords being transmitted. Attackers can then use the captured login credentials to impersonate authorized users and access restricted information. To prevent password sniffing, users should avoid sending sensitive information over public networks and be aware that passwords could be at risk of interception.
Speedy ip trace back(sipt) for identifying sadhanSadan Kumar
The document proposes a new method called Speedy IP Traceback (SIPT) to identify denial-of-service attacks. SIPT works by having routers insert the media access control (MAC) address of the client and the router's IP address into packets. This allows the destination to identify the attacker's boundary router and MAC address, tracing the attack path. Traditionally, mechanisms like ingress filtering, link testing, and packet marking have been used but have not kept pace with evolving attacks. SIPT provides a more direct way to find the router connected to the attacker.
This document summarizes Rumor Riding, a lightweight non-path based mutual anonymity protocol for peer-to-peer systems. Rumor Riding uses symmetric cryptography and distributes rumors through selective flooding to anonymize query generation and response. It achieves anonymity through an initiator generating multiple rumors that are expected to randomly intersect at responder nodes. The protocol can withstand various attacks while minimizing overhead through techniques like adaptive TTL and rumor caching. Performance is evaluated based on metrics like collision rate, sower diversity, and traffic overhead.
The document discusses network security vulnerabilities like spoofing and flooding attacks. It covers denial of service (DoS) and distributed denial of service (DDoS) attacks. Firewalls like packet filters and proxies are introduced as a way to limit network access and inspect traffic according to security policies. Intrusion detection systems (IDS) are also mentioned for detecting intrusions through signatures or anomalies.
The document discusses key distribution and authentication using symmetric encryption. It describes several options for distributing symmetric keys between two parties, including having a third party select and deliver the key. The most preferable option is using a key distribution center (KDC) that can dynamically provide session keys for encryption between hosts that have been granted permission to communicate. The document then provides details on how Kerberos, a widely used authentication system, implements this approach using a KDC, ticket granting tickets, and service granting tickets to authenticate users and allow secure communication without transmitting plaintext passwords. It also summarizes some of the environmental and technical deficiencies addressed in the updated Kerberos version 5 protocol.
This document provides an overview of security issues in wireless ad-hoc networks. It discusses the properties and functions of mobile ad-hoc networks (MANETs) including availability, authentication, confidentiality, and data integrity. It classifies attacks as internal/external and active/passive. Specific attacks like wormhole and black hole are described. Solutions to these attacks include packet leashes to restrict travel distance and binding user identity to trust levels. Key management is important, using group, symmetric, and shared keys. In conclusion, more research is needed to fully address security challenges in unpredictable wireless networks.
Tor Hidden Services enables server anonymity, which may lead potentially to illegal and criminal activities. In this presentation, state-of-the-art literature method against hidden service anonymity are presented to overcome this issue.
A review paper on watchdog mechanism in wireless sensor network to eliminate ...eSAT Journals
Abstract Wireless Sensor network (WSN) are broadly used today in various fields such as environmental control, surveillance task, object tracking, military applications etc. As WSN is an ad-hoc network which is deployed in such an environment which is physically insecure, intrusion detection has been one of the major area of research in WSN. Inorder to achieve an appropriate level of security in WSNs we cannot depend on cryptographic techniques as these techniques fall prey to insider attacks. This paper discusses on watchdog mechanism, one of the intrusion detection techniques in Wireless Sensor Network. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. The main area of focus in this paper is being made to the problems in existing watchdog technique for malicious node detection. Index Terms: Wireless Sensor Network, Security Intrusion Detection, Watchdog.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
Dynamic nature of Mobile Ad-hoc networks (MANET) challenges the quality of service (QoS)
because route failure probability is increased in MANET due to the mobility of nodes. Lack of fixed
infrastructure, wireless shared medium and dynamic topology makes MANET prone to different types of
attacks. Ad-hoc On-Demand Distance Vector (AODV) routing protocol in MANETs which is vulnerable to a
variety of security threats in ad-hoc networks. Black hole attack is an attack that drop considerable number of
packet by performing packet forwarding misbehaviour and violate the security to cause Denial-of-Service
(DoS) in Mobile Ad-hoc networks (MANET). In this paper we investigate different mechanism to detect and
prevent black hole attack in AODV protocol. We also discuss about advantages and disadvantages of the
methods.
The document discusses the gray hole attack in MANETs using the AODV routing protocol. The gray hole attack involves a malicious node selectively dropping packets in a manner that is difficult to detect. The summary proposes a detection method that involves (1) the source node broadcasting a fake RREQ to identify malicious nodes, (2) comparing the destination sequence numbers of replying nodes to a threshold value to identify attackers, and (3) broadcasting identified gray hole nodes to other nodes in the network. The method aims to improve on existing detection techniques by using destination-based routing and sequence number comparisons to more accurately detect gray hole attacks.
This document describes a proposed privacy-preserving wireless network application based on location proof. It identifies limitations in existing systems, such as threats from colluding attacks. The proposed design aims to address these by using pseudonyms, shared secrets, and correlating node IDs with credentials to prevent unauthorized access. The design assumes credentials are pre-established and nodes change pseudonyms over time. Algorithms for collecting location proofs between a prover and witness are described, along with work done verifying proofs and using unique device IDs for authentication to restrict credential/pseudonym use. A timeline outlines implementation progress.
The document summarizes research on preserving source location privacy in wireless sensor networks. It proposes using computer-based image recognition to analyze traffic patterns and detect modified data packets. The key points are:
1) Wireless sensor networks are vulnerable to traffic analysis attacks that can reveal the location of data sources. Existing solutions have limitations like increased energy use.
2) The paper proposes using computer-based image recognition to analyze traffic and identify packets whose delivery was delayed, indicating modification by an attacker.
3) If the attacking node is identified, it would be removed from the network. This approach aims to effectively preserve source location privacy against traffic analysis attacks.
This document provides a taxonomy for classifying approaches to detecting botnets. It discusses categorizing detection approaches based on 6 dimensions: (1) the type of botnet being detected such as IRC-based or P2P, (2) what aspect of the botnet is being tracked such as the C&C channel or bot activities, (3) the source of features such as the host or network traffic, (4) how features are extracted such as through passive or active means, (5) how features are correlated such as vertically or horizontally, and (6) the detection algorithm used such as statistical classification or cluster analysis. The document also discusses challenges in detecting botnets given their evolving architectures and activities, and potential future
The document discusses various topics related to cryptography including digital signatures, digital signature standards, encryption methods like RSA and DSS, attacks on cryptosystems like brute force and differential cryptanalysis, applications of cryptography like VPNs, SSL/TLS, PGP, S/MIME for email, and public key infrastructure. It also covers certificate management, constraints on trust between certificate authorities, and information hiding techniques like steganography and watermarking.
The document provides an overview of existing IP traceback mechanisms, including controlled flooding, input debugging, overlay networks, probabilistic packet marking, deterministic packet marking, packet messaging, packet logging, and hybrid approaches. It discusses taxonomy, capabilities, evaluation criteria, comparisons of mechanisms, and applications of traceback. The conclusion questions whether traceback is truly needed given current intrusion detection and prevention capabilities.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document provides information on network security fundamentals including cryptography and firewalls. It defines cryptography as a method of protecting information using codes that only intended recipients can read. It describes symmetric and asymmetric encryption techniques. Symmetric encryption requires secure key distribution while asymmetric encryption uses public/private key pairs to securely exchange messages. The document also defines firewalls as devices that control network traffic flow according to security policies, and describes common firewall types including packet filters, stateful filters, and application gateways.
Wireless sensor networks consist of distributed autonomous devices that can monitor various environmental conditions. Securing these networks is challenging due to constraints on sensors' processing, memory, and battery power. Attacks on wireless sensor networks can target security mechanisms or routing mechanisms. Common attacks include denial of service through jamming, spoofing and altering information in transit, replication attacks, and physical node destruction. Effective security schemes must provide data confidentiality, integrity, and freshness given sensors' limitations. Developing efficient detection of compromised nodes reporting false data while ensuring holistic security in wireless sensor networks remains an important research challenge.
Routers play an important role in cyber forensics investigations. During an investigation, an analyst should gather evidence from routers to help determine the source of an attack. This includes examining router logs, configurations, and volatile memory to find artifacts left by attackers. Log files may contain source IP addresses and protocols used. Configurations should be collected but not reset to avoid destroying evidence. Commands like "show access list" and "show users" can provide clues about hacker activity on the router. Properly documenting the chain of custody of all router evidence is crucial for the investigation.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
This document discusses message authentication techniques. It describes message authentication codes (MACs) which use a secret key to generate a code appended to messages to verify authenticity and integrity. Hash functions can also provide authentication but do not use a secret key. HMAC is introduced as a technique that incorporates a secret key into existing hash functions like SHA-1/2 to create a MAC. Digital signatures, which encrypt a hash of a message with a private key, providing both authentication and non-repudiation, are also discussed.
Password sniffing refers to the use of password sniffing programs or software that monitor network traffic to capture and record usernames and passwords as users login to networks. These programs listen to data packets passing through a network and record any instances of passwords being transmitted. Attackers can then use the captured login credentials to impersonate authorized users and access restricted information. To prevent password sniffing, users should avoid sending sensitive information over public networks and be aware that passwords could be at risk of interception.
Speedy ip trace back(sipt) for identifying sadhanSadan Kumar
The document proposes a new method called Speedy IP Traceback (SIPT) to identify denial-of-service attacks. SIPT works by having routers insert the media access control (MAC) address of the client and the router's IP address into packets. This allows the destination to identify the attacker's boundary router and MAC address, tracing the attack path. Traditionally, mechanisms like ingress filtering, link testing, and packet marking have been used but have not kept pace with evolving attacks. SIPT provides a more direct way to find the router connected to the attacker.
This document summarizes Rumor Riding, a lightweight non-path based mutual anonymity protocol for peer-to-peer systems. Rumor Riding uses symmetric cryptography and distributes rumors through selective flooding to anonymize query generation and response. It achieves anonymity through an initiator generating multiple rumors that are expected to randomly intersect at responder nodes. The protocol can withstand various attacks while minimizing overhead through techniques like adaptive TTL and rumor caching. Performance is evaluated based on metrics like collision rate, sower diversity, and traffic overhead.
The document discusses network security vulnerabilities like spoofing and flooding attacks. It covers denial of service (DoS) and distributed denial of service (DDoS) attacks. Firewalls like packet filters and proxies are introduced as a way to limit network access and inspect traffic according to security policies. Intrusion detection systems (IDS) are also mentioned for detecting intrusions through signatures or anomalies.
The document discusses key distribution and authentication using symmetric encryption. It describes several options for distributing symmetric keys between two parties, including having a third party select and deliver the key. The most preferable option is using a key distribution center (KDC) that can dynamically provide session keys for encryption between hosts that have been granted permission to communicate. The document then provides details on how Kerberos, a widely used authentication system, implements this approach using a KDC, ticket granting tickets, and service granting tickets to authenticate users and allow secure communication without transmitting plaintext passwords. It also summarizes some of the environmental and technical deficiencies addressed in the updated Kerberos version 5 protocol.
This document provides an overview of security issues in wireless ad-hoc networks. It discusses the properties and functions of mobile ad-hoc networks (MANETs) including availability, authentication, confidentiality, and data integrity. It classifies attacks as internal/external and active/passive. Specific attacks like wormhole and black hole are described. Solutions to these attacks include packet leashes to restrict travel distance and binding user identity to trust levels. Key management is important, using group, symmetric, and shared keys. In conclusion, more research is needed to fully address security challenges in unpredictable wireless networks.
Tor Hidden Services enables server anonymity, which may lead potentially to illegal and criminal activities. In this presentation, state-of-the-art literature method against hidden service anonymity are presented to overcome this issue.
A review paper on watchdog mechanism in wireless sensor network to eliminate ...eSAT Journals
Abstract Wireless Sensor network (WSN) are broadly used today in various fields such as environmental control, surveillance task, object tracking, military applications etc. As WSN is an ad-hoc network which is deployed in such an environment which is physically insecure, intrusion detection has been one of the major area of research in WSN. Inorder to achieve an appropriate level of security in WSNs we cannot depend on cryptographic techniques as these techniques fall prey to insider attacks. This paper discusses on watchdog mechanism, one of the intrusion detection techniques in Wireless Sensor Network. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. The main area of focus in this paper is being made to the problems in existing watchdog technique for malicious node detection. Index Terms: Wireless Sensor Network, Security Intrusion Detection, Watchdog.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
Dynamic nature of Mobile Ad-hoc networks (MANET) challenges the quality of service (QoS)
because route failure probability is increased in MANET due to the mobility of nodes. Lack of fixed
infrastructure, wireless shared medium and dynamic topology makes MANET prone to different types of
attacks. Ad-hoc On-Demand Distance Vector (AODV) routing protocol in MANETs which is vulnerable to a
variety of security threats in ad-hoc networks. Black hole attack is an attack that drop considerable number of
packet by performing packet forwarding misbehaviour and violate the security to cause Denial-of-Service
(DoS) in Mobile Ad-hoc networks (MANET). In this paper we investigate different mechanism to detect and
prevent black hole attack in AODV protocol. We also discuss about advantages and disadvantages of the
methods.
The document discusses the gray hole attack in MANETs using the AODV routing protocol. The gray hole attack involves a malicious node selectively dropping packets in a manner that is difficult to detect. The summary proposes a detection method that involves (1) the source node broadcasting a fake RREQ to identify malicious nodes, (2) comparing the destination sequence numbers of replying nodes to a threshold value to identify attackers, and (3) broadcasting identified gray hole nodes to other nodes in the network. The method aims to improve on existing detection techniques by using destination-based routing and sequence number comparisons to more accurately detect gray hole attacks.
This document describes a proposed privacy-preserving wireless network application based on location proof. It identifies limitations in existing systems, such as threats from colluding attacks. The proposed design aims to address these by using pseudonyms, shared secrets, and correlating node IDs with credentials to prevent unauthorized access. The design assumes credentials are pre-established and nodes change pseudonyms over time. Algorithms for collecting location proofs between a prover and witness are described, along with work done verifying proofs and using unique device IDs for authentication to restrict credential/pseudonym use. A timeline outlines implementation progress.
The document summarizes research on preserving source location privacy in wireless sensor networks. It proposes using computer-based image recognition to analyze traffic patterns and detect modified data packets. The key points are:
1) Wireless sensor networks are vulnerable to traffic analysis attacks that can reveal the location of data sources. Existing solutions have limitations like increased energy use.
2) The paper proposes using computer-based image recognition to analyze traffic and identify packets whose delivery was delayed, indicating modification by an attacker.
3) If the attacking node is identified, it would be removed from the network. This approach aims to effectively preserve source location privacy against traffic analysis attacks.
This document provides a taxonomy for classifying approaches to detecting botnets. It discusses categorizing detection approaches based on 6 dimensions: (1) the type of botnet being detected such as IRC-based or P2P, (2) what aspect of the botnet is being tracked such as the C&C channel or bot activities, (3) the source of features such as the host or network traffic, (4) how features are extracted such as through passive or active means, (5) how features are correlated such as vertically or horizontally, and (6) the detection algorithm used such as statistical classification or cluster analysis. The document also discusses challenges in detecting botnets given their evolving architectures and activities, and potential future
The document discusses various topics related to cryptography including digital signatures, digital signature standards, encryption methods like RSA and DSS, attacks on cryptosystems like brute force and differential cryptanalysis, applications of cryptography like VPNs, SSL/TLS, PGP, S/MIME for email, and public key infrastructure. It also covers certificate management, constraints on trust between certificate authorities, and information hiding techniques like steganography and watermarking.
The document provides an overview of existing IP traceback mechanisms, including controlled flooding, input debugging, overlay networks, probabilistic packet marking, deterministic packet marking, packet messaging, packet logging, and hybrid approaches. It discusses taxonomy, capabilities, evaluation criteria, comparisons of mechanisms, and applications of traceback. The conclusion questions whether traceback is truly needed given current intrusion detection and prevention capabilities.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document provides information on network security fundamentals including cryptography and firewalls. It defines cryptography as a method of protecting information using codes that only intended recipients can read. It describes symmetric and asymmetric encryption techniques. Symmetric encryption requires secure key distribution while asymmetric encryption uses public/private key pairs to securely exchange messages. The document also defines firewalls as devices that control network traffic flow according to security policies, and describes common firewall types including packet filters, stateful filters, and application gateways.
Wireless sensor networks consist of distributed autonomous devices that can monitor various environmental conditions. Securing these networks is challenging due to constraints on sensors' processing, memory, and battery power. Attacks on wireless sensor networks can target security mechanisms or routing mechanisms. Common attacks include denial of service through jamming, spoofing and altering information in transit, replication attacks, and physical node destruction. Effective security schemes must provide data confidentiality, integrity, and freshness given sensors' limitations. Developing efficient detection of compromised nodes reporting false data while ensuring holistic security in wireless sensor networks remains an important research challenge.
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKSijwmn
The mobile ad hoc networks get subjected to security threats like other wireless networks. But due to their
peer to peer approach and absence of infrastructural resources the mobile ad hoc networks can not use
strong cryptographic mechanisms as used by their other wireless counterparts. This led to the
development of trust based methods as security solutions wherein a trusted node is relaxed from security
checks when the trust value reaches to a particular limit. The trust methods are prone to security risks but
have found their acceptance due to efficiency over computationally expensive and time consuming
cryptographic methods. The major problem with the trust methods is the period during which trust is
growing and is yet to reach the requisite threshold. This paper proposes security mechanism dependent
upon Random Electronic Code Book (RECB) combined with permutation functions. The proposed
mechanism has low time complexity, is easier to implement, computationally inexpensive and has very
high brute force search value. It can be used as the temporary security guard during the trust growth
phase. The impetus behind the proposed design is the reliance upon shared information between the peers
in the ad hoc networks.
This document discusses security issues and proposed mechanisms for wireless sensor networks. It begins by defining wireless sensor networks and describing their applications. It then outlines several security threats specific to these networks, such as denial of service attacks, Sybil attacks, wormhole attacks, and traffic analysis attacks. The document reviews cryptography and steganography techniques for wireless sensors and proposes that a holistic approach is needed to ensure security across all network layers. It concludes that detecting false information from compromised nodes is a major research challenge and developing efficient holistic security is also an important open problem.
This presentation covers Security Issues in Mobile Adhoc Network in brief, highlighting various attacks such as Sleep Deprivation, Wormhole, Blackhole and Eavesdropping in particulars.
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...chennaijp
We have best 2014 free dot not projects topics are available along with all document, you can easy to find out number of documents for various projects titles.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/dot-net-projects/
Denial of Service attacks – Definitions, related surveys
Traceback of DDoS Attacks – Proposed method, advantages, future work
Detection methods with Shannon and Renyi cross entropy – Previous works, proposed method, dataset and results
The added value of entropy detection methods
References
1) The document discusses security issues in wireless sensor networks, specifically focusing on attacks against routing protocols and potential countermeasures. It outlines common attacks like spoofing, selective forwarding, sinkhole attacks, Sybil attacks, wormholes, and HELLO flood attacks.
2) The document then provides an overview of potential countermeasures like link layer security, identity verification protocols, verification of link bidirectionality, and multipath routing.
3) Finally, the document emphasizes the importance of secure routing protocol design and highlights the need for protocols to incorporate security features to defend against insider and outsider attacks.
Secure routing in wsn-attacks and countermeasuresMuqeed Abdul
1) The document discusses security issues in wireless sensor networks, specifically focusing on attacks against routing protocols and potential countermeasures. It outlines common attacks like spoofing, selective forwarding, sinkhole attacks, Sybil attacks, wormholes, and HELLO flood attacks.
2) The document then discusses countermeasures against each type of attack, such as link layer security, identity verification, verification of link bidirectionality, multipath routing, and better protocol design.
3) Finally, the document emphasizes that routing protocols for wireless sensor networks must be designed with security in mind to effectively defend against both insider and outsider adversaries.
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERSvtunotesbysree
The document discusses different generations of firewalls and intrusion detection and prevention systems (IDPS). It describes the key characteristics of five generations of firewalls from static packet filtering to stateful inspection and kernel proxy firewalls. It also discusses the advantages of network-based IDPS (NIDPS) over host-based IDPS, and describes three common detection methods used by IDPS: signature-based, statistical anomaly-based, and stateful packet inspection. Wireless NIDPS and network behavior analysis systems are also introduced as two subtypes of NIDPS.
Mobile fraud detection using neural networksVidhya Moorthy
This document discusses using neural networks for mobile fraud detection. It begins by defining fraud and how it impacts mobile network operators. It then classifies different types of fraud and indicators used for detection. Current detection methods like rule-based and differential analysis are described along with their limitations. Neural networks are proposed as an improved method for both existing and new fraud detection by training on relevant data only. The document concludes neural networks can help reduce false alarms while still detecting stolen phones but recommends adding a password verification process.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEEMEMTECHSTUDENTPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
This document provides an overview of a distributed sniffing and scanning project. It discusses:
1) Collecting network information from multiple points using sniffers and scanners placed on different machines.
2) Analyzing the collected information both centrally on a server and distributed across communicating machines.
3) Using the information to detect irregular network activity and vulnerabilities, and inform network administrators.
The document considers advantages and disadvantages of centralized and distributed approaches. It also outlines the general architecture of the project, which involves Java clients and servers to distribute commands to sniffing and scanning tools, and analysis of the collected data.
The KAMAN scheme proposes using multiple Kerberos servers for distributed authentication in mobile ad hoc networks. When a node needs to communicate securely with another, it requests a session key from one of the Kerberos servers. The server generates the key, encapsulates it in a ticket, and sends it to the requesting client. The client can then use this ticket to securely communicate with the intended party. The scheme introduces measures like database replication and server elections to handle node mobility and failures.
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AAKASH S
The document discusses a routing protocol called AASR for mobile ad hoc networks (MANETs) operating in adversarial environments. The objectives of AASR are to provide anonymity, location privacy, and defend against active attacks while maintaining throughput and reducing packet loss. It aims to achieve this through the use of group signatures, onion routing, and trapdoors to hide the identities of nodes and destinations of packets. The document reviews related work on onion routing, group signatures, and anonymous on-demand routing protocols. It also outlines some attacks on MANETs like location privacy attacks and discusses how the proposed framework uses techniques like trapdoors, asymmetric keys, and pseudonyms to make routing anonymous and untraceable.
SECURE LOCATION BASED ROUTING FOR MANETSAnkur Singhal
The video demonstrates sending the file from source to the destination by initially encrypting it using multihops and then decrypting it at the receiver's end
The document discusses various topics in network security including:
1. It describes the OSI security architecture and defines security attacks, mechanisms, and services.
2. It covers different types of security attacks like passive attacks and active attacks.
3. It discusses security services like authentication, access control, data confidentiality, and data integrity.
4. It provides an overview of classical encryption techniques like symmetric ciphers, substitution ciphers, transposition ciphers, and steganography.
This document discusses confidentiality using symmetric encryption. It covers key topics like placement of encryption, traffic analysis, key distribution issues and solutions, and generating random numbers. Placement of encryption can be at the link level or end-to-end. Key distribution is a challenge for symmetric encryption, as both parties need to securely share a key. Common approaches involve physical delivery, use of a trusted third party, or deriving new keys from old keys. Generating true randomness is difficult, so pseudorandom number generators are often used instead to produce cryptographically secure random numbers.
Similar to Cryptography based misbehavior detection for opportunistic network (20)
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Dandelion Hashtable: beyond billion requests per second on a commodity server
Cryptography based misbehavior detection for opportunistic network
1. Cryptography-Based Misbehaviour Detection and
Trust Control Mechanism for Opportunistic
Network Systems
Guided by, Prepared by,
Saranya Shaji P H SHAHANA
Asst. Professor Roll no: 41
Dept. of CSE
2. AIM
• To design a robust and scalable security overlay over trust-based routing.
• To provide security services through cryptography.
3. ABSTRACT
Opportunistic networks (OppNets) are a kind of wireless networks that
provide the opportunity to have social interaction and obtain data that can be
used for message passing decision. One among the challenge for OppNets is to
take efficient routing decisions on securing the delivery of messages to the
destination. The trust based mechanism are capable of providing social security
in terms of access control in the network, but do not provide security services
through cryptographic means. The commercial application of OppNets not
only demands the social security, but also requires cryptographic security. Here
proposes a robust design of security overlay over trust based routing for
detecting malicious nodes and provide security services such as authentication,
message confidentiality, and integrity in the network through cryptographic
mechanism.
4. INTRODUCTION
o DTNs are networks with intermittent end to end connections.
o OppNets are subclass of DTNs characterized by,
• Wireless
• Hand held devices carried by the people are the nodes.
• Routes are built dynamically to reach the destination.
o The commercial usage of OppNets demands strengthening of security in
the network.
o Trust based routing mechanism cannot provide security services.
o Sparsity in the network, resource constraint restricted use of
cryptography.
5. INTRODUCTION(cont..)
o This system detects maliciousness through depreciation of trust.
o Provides hop to hop and end to end authentication through asymmetric and
symmetric respectively.
o A robust design of security overlay over trust based mechanism for detecting
malicious nodes and providing social security through cryptography.
6. EXISTING SYSTEM
• Currently, the trust and reputation based mechanisms are used to authenticate
a node’s identity and avoid malicious nodes.
• The trust based mechanisms checks whether the trust value of a particular node
is above a threshold.
• The trust based mechanism are capable of providing social security in terms of
access control in the network.
• Incentive-based routing mechanisms are also designed on trust based
reputation system for thwarting selfishness and increase participation.
7. LITERATURE SURVEY
Sl.no. Name Year Advantage Disadvantage
1.
Privacy enhanced social
network routing in
OppNets
2010
• Analyse potential
treats
• Hide social n/w
information
• Only initial
evaluation of the
routing schemes
• Treats can increase
2.
IRONMAN: Using social
networks to add incentives
and reputation to OppNets
2011
• Fastest and
accurate
• No infrastructure
network
• Trust mechanism
only provide social
security
3.
A trust based framework
for data forwarding in
OppNets
2013
• PFM introduced
• Assisted data
forwarding
• Explains against
black hole attack
4.
Security and trust
management in OppNets:
A survey
2014
• Proposes a
general security
architecture
• Does not address
security aspect of
registering.
5.
Reputation based
malicious node detection
in OppNets
2016
• Node by node
detection reduces
the n/w overhead
and difficulties
• Modification
attacks can’t be
detected
8. PROPOSED SYSTEM
• A security overlay is designed over trust based routing mechanism.
• Spy nodes keep careful watch over the participative nodes in the network.
• The hop-to-hop authentication using asymmetric cryptography.
• End-to-end authentication using symmetric cryptography.
• Suspicious nodes figured out and are under the supervision of spy nodes.
• Spy nodes then declares it as malicious or as a normal node.
• Maliciousness of the node is modified by decreasing the trust value.
9. A. Motivation
• The commercial usage of OppNets demands the strengthening of security
for the network.
• The distributive nature and low end computing devices always restrict the
OppNets from using cryptographic solutions for security perspective.
• Most of trust-based routing in OppNets is supposed to cater the
identification and isolation of socially misbehaved nodes in the network.
• The existing trust based protocol only provides social security to the
network.
• The commercial application of OppNets not only demands the social
security, but also requires the cryptographic security.
B. Design Assumptions
• Designed for high-end computing mobile devices in dense urban settings.
10. • The distributive and disruptive nature of OppNets restricts the use of trusted
third party for key distribution purpose.
• Delffi–Hellman key exchange protocol is used.
• Limited to address problem posed by malicious nodes within the network.
C. Security Model
• The aim of this design is to protect the normal nodes from malicious nodes in
the network.
• The security framework designed has been inspired from the intelligence
network of a country.
• The executive wing collects and produces evidence of malicious nodes in
front of the judiciary.
• Which evaluates, then disseminates the judgment regarding the presence of
maliciousness in the network.
11. 1) Security Infrastructure
• The proposed model is infrastructure dependent for providing
security in the network.
• Classified in to two components:
a) Physical intelligence node component
b) Logical cryptographic component
a) Physical intelligence node component:
• The intelligence nodes in the network are responsible for
security measures.
12. • As depicted in Fig. 1, the network area is divided into separate areas
of influence called zones and each zone is assigned with a spy team.
• Each zone is assigned with a spy team.
• One of those node act as head spy.
• A single judge node for four adjacent zone’s spy team.
13. b) Logical cryptographic component:
• The cryptographic algorithm provides
o Message integrity
o Authentication
o Confidentiality
• The exchange of keys uses the established Diffie–Hellman
key exchange protocol.
• As each node carries only the public keys of immediate
neighbors.
14. • As shown in Fig. 2, once the symmetric keys are exchanged
between the source and destination the communication nodes use
these keys for message encryption.
• The end-to-end message integrity is ensured by HMAC.
• HMAC(K,M) is performed, generates MD.
• Generated MD appended with the encrypted message at the
source.
• The appended MD is compared against the revaluated MD at the
destination.
• The comparison reveals the integrity and the encryption of the
message at the source site and also ensures its confidentiality in
the network.
• Hop to hop authentication through asymmetric cryptographic
algorithm RSA.
15. 2) Intelligence Modelling
• Infrastructure nodes collects relevant misbehaving evidence of
malicious nodes.
• The modelling of intelligent nodes requires discussion on profiling and
communication among infrastructure nodes.
a) Profiling: The profiling of normal nodes, spy nodes, head
spy nodes, judge nodes, and malicious nodes.
1. Normal node:
• Prone to attacks.
• A normal node maintains nodes encounter vector (𝐸𝑉𝑖) with
respect to time.
• The encounter vector has three fields:
1. id of the encountered node,
2. 𝑇𝑖𝑚𝑖, the time stamp of encountered time,
3. 𝑃𝑟𝑖 (𝑇𝑖𝑚𝑖), the digitally signed 𝑇𝑖𝑚𝑖 with the private key
of the encountered node i.
16. • Normal nodes also maintain the
• message encounter lists MSG_ENC_LIST,
• message forward list MSG_FOR_LIST,
• request vector , 𝑅𝑖.
• Requests 𝑅𝑖 to spy at time 𝑡0.
2. Spy nodes and head spy
• Critical for identifying malicious nodes.
• These spy nodes as a coordinated team follow up the node and keep up
the surveillance vector 𝑆𝑉 𝑖
𝑡 for node during a time duration t. The
𝑆𝑉 𝑖
𝑡 maintains the following fields as shown in Fig. 3.
17. 3.Judge node
• The process of collecting and establishing evidences against
malicious nodes by spy nodes is shared with the corresponding
judge node.
• The judge node reorganizes this collected information from
different zones spy head.
• The judge node checks for the MSG_ENC_LIST at a node i and
then looks for the paired message ids for which the source of one
message id is the destination for other message id and vice-versa.
Communication:
• Two types:
• Intranode communication
• Internode communication
20. E. Mobility Modelling
• The mobility pattern of infrastructure node is crucial for the success.
1. Spy Node Mobility
• The spy nodes work under three activation modes: self-induced,
spy-induced, and judge-induced activation.
a) Self-induced activation:
• Spy nodes work in proactive mode.
• Suppose there is a zone i that needs to be placed with spy nodes.
• Initially, the spy team 𝑆𝑇 𝑖
𝑘 [P,N] with team identity k and having
N members with node id P as the team head are assigned to zone i
in the network.
• The spy nodes are then randomly placed in the zone.
• The mobility of the spy nodes is governed by the finite-state
automaton machine FSAM1.
21. • “Q” represents the set of internal states for FSAM1
• The set of finite alphabet ∑={a,b,c,d,e,f}represents the directions
southeast, east, southwest, west, northwest, and northeast,
respectively.
• The grammar “Ω ι ” of the FSAM1 determines the direction of
movement of a spy node at a particular time.
• The internal state “A” is considered to be the initial and final state
of the machine.
22. b) Spy-induced activation
• The spy nodes may request the other spy nodes for
message/node follow-up operations.
• Let a node Ni roams in the network with its last two
coordinates as (𝑥𝑖,𝑦𝑖)at time 𝑡 𝑘 and(𝑥𝑗,𝑦𝑗)at time 𝑡 𝑘′,
respectively.
• It is used in calculating the directional angle D𝑖𝑛
𝑄
with
respect to horizontal x-axis, as follows:
Varying speed,
23. 2) Spy Node Calculation:
• Let the dimension of zone in concern be of length x and breadth y,
the transmission range of the nodes is R.
• Let the average numbers of spy nodes in the zone be “n.”
• Then the average region covered by the spy nodes is nπ𝑅2
.
• If the nodes are assumed to be statically placed then the average
region not covered up also knows as black shed area would be
xy−nπ𝑅2
.
• Considering a scenario, when black shed area is virtually zero, then
24. • In real scenario the black shed area could not be zero. Hence,
assuming that at least p% of the total zones is under black shed.
• We have ,
• Let us introduce the parameter d for mobility of spy nodes in the
network. Let the introduction of mobility further reduce the
percentage of black shed area by w, then
25. • The relationship between w and d is as shown in Fig.4.
• The maximum value of w = k at d = h facilitates the calculation for
minimum number of spy nodes in the zone, represented as :
26. • The number of spy nodes in the zone depends on the parabolic
equation between w and d.
• Further helping in utilizing the infrastructure resources
effectively.
27. F. Trust
• It identifies and isolates the malicious nodes in the network.
• Also affects the trust of the malicious nodes through the application of
TAF.
• The scale of trust breachment is directly responsible for ascertaining the
TAF, which is as follows:
28. ADVANTAGES
• Provide various security services through cryptographic means.
• Uses latest cryptographic techniques.
• Provides a reliable security service.
• Robust and scalable.
29. DISADVANTAGES
• Compromise between the security performance and the energy usage in the
system.
• The cost associated with the system is high.
• Limited to problems within the network.
30. CONCLUSION
This paper proposed, a security overlay designed over a trust based routing
mechanism. The designed scheme uses the infrastructure nodes for keeping the vigilance
upon the participative nodes in the network and detecting the malicious nodes. The usage
of established symmetric and asymmetric key cryptography provides authentication,
message confidentiality and integrity in the network. The surveillance nodes provide TAF
to the protocol for adjusting trust values of the malicious nodes. The infrastructure
surveillance along with the cryptographic features provides a reliable security and detects
malicious nodes. The results prove that security overlay helps in thwarting the malicious
behaviour and improves average performance by 35%.
31. FUTURE WORK
• Needs to address the energy efficiency issue (associated with the
infrastructure nodes.)
• The cost needs to be reduced.
32. REFERENCE
[1] S. K. Dhurandher, A. kumar, and M. S. Obaidat, “Cryptography based
misbehaviour detection and trust control mechanism for opportunistic
network systems,” IEEE Systems Journal, 2017.
[2] I. Parris, G. Bigwood, T. Henderson, “Privacy-enhanced social
network routing in opportunistic networks,” in Proc. 8th IEEE Int.
Conf. Pervasive Comput. Commun. Workshops, 2010.
[3] G. Bigwood, and T. Henderson, “Ironman: Using socialnetworks to
add incentives and reputation to opportunistic networks,” in Proc.
IEEE 3rd Int. Conf. Soc. Comput., 2011.
[4] N. Li, S. K. Das, “A trust-based framework for data forwarding in
opportunistic networks,” Ad Hoc Netw., 2013.
[5] Y. Wu, Y. Zhao, M. Riguidel, G. Wang, and P. Yi, “Security and trust
management in Opportunistic networks: a survey,” in Wiley Online
Library, 2014.
[6] A. Ahmed, M. Alajeely, R. Doss, “Reputation based malicious node detection in
OppNets,” in IEEE 16th Int. Joint Conf. Comp. Science and Soft. Eng., 2016.