SlideShare a Scribd company logo
Logic Mind Technologies
Vijayangar (Near Maruthi Medicals), Bangalore-40
Ph: 8123668124 // 8123668066
Privacy-Preserving and Truthful Detection of
Packet Dropping Attacks in Wireless Ad Hoc
Networks
Abstract
Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless
ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are
interested in determining whether the losses are caused by link errors only, or by the combined
effect of link errors and malicious drop. We are especially interested in the insider-attack case,
whereby malicious nodes that are part of the route exploit their knowledge of the communication
context to selectively drop a small amount of packets critical to the network performance.
Because the packet dropping rate in this case is comparable to the channel error rate,
conventional algorithms that are based on detecting the packet loss rate cannot achieve
satisfactory detection accuracy. To improve the detection accuracy, we propose to exploit the
correlations between lost packets. Furthermore, to ensure truthful calculation of these
correlations, we develop a homomorphic linear authenticator (HLA) based public auditing
architecture that allows the detector to verify the truthfulness of the packet loss information
reported by nodes. This construction is privacy preserving, collusion proof, and incurs low
communication and storage overheads. To reduce the computation overhead of the baseline
scheme, a packet-block-based mechanism is also proposed, which allows one to trade detection
accuracy for lower computation complexity. Through extensive simulations, we verify that the
proposed mechanisms achieve significantly better detection accuracy than conventional methods
such as a maximum-likelihood based detection.
SYSTEM SPECIFICATION
Software Specification
Operating system : Linux (Ubuntu)
Software : Network Simulator 2.35
Programming languages : Tool Command Language, AWK, C++
Hardware Specification
Main processor : Dual Core
Hard disk capacity : 80GB
Cache memory : 2 GB
PROJECT FLOW:
First Review:
Literature Survey
Paper Explanation
Design of Project
Project Enhancement explanation
Second Review:
Implementing 40% of Base Paper
Third Review
Implementing Remaining 60% of Base Paper with Future Enhancement (Modification)
For More Details please contact
Logic Mind Technologies
Vijayangar (NearMaruthi Medicals), Bangalore-40
Ph: 8123668124 // 8123668066
Mail: logicmindtech@gmail.com

More Related Content

What's hot

Network Security IEEE 2015 Projects
Network Security IEEE 2015 ProjectsNetwork Security IEEE 2015 Projects
Network Security IEEE 2015 Projects
Vijay Karan
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java Projects
Vijay Karan
 
On the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksOn the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networks
JPINFOTECH JAYAPRAKASH
 
Spam email filtering
Spam email filteringSpam email filtering
Spam email filtering
National Institute
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
ranjith kumar
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
IJCNCJournal
 
By passing infected areas in wireless sensor networks using bpr
By passing infected areas in wireless sensor networks using bprBy passing infected areas in wireless sensor networks using bpr
By passing infected areas in wireless sensor networks using bpr
LogicMindtech Nologies
 
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Wright State University, Dayton, OH, USA
 
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETSSECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
IJCNCJournal
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
IRJET Journal
 
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P SystemNon Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
International Journal of Engineering Inventions www.ijeijournal.com
 
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKDETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
IJCI JOURNAL
 
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
IJNSA Journal
 
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
IJCNCJournal
 
A fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flowsA fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flowsUltraUploader
 
Machine Learning Project
Machine Learning ProjectMachine Learning Project
Machine Learning Projectbutest
 

What's hot (16)

Network Security IEEE 2015 Projects
Network Security IEEE 2015 ProjectsNetwork Security IEEE 2015 Projects
Network Security IEEE 2015 Projects
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java Projects
 
On the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksOn the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networks
 
Spam email filtering
Spam email filteringSpam email filtering
Spam email filtering
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
 
By passing infected areas in wireless sensor networks using bpr
By passing infected areas in wireless sensor networks using bprBy passing infected areas in wireless sensor networks using bpr
By passing infected areas in wireless sensor networks using bpr
 
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
 
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETSSECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P SystemNon Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
 
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKDETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
 
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
 
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
 
A fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flowsA fast static analysis approach to detect exploit code inside network flows
A fast static analysis approach to detect exploit code inside network flows
 
Machine Learning Project
Machine Learning ProjectMachine Learning Project
Machine Learning Project
 

Viewers also liked

Asteroid Observations - Real Time Operational Intelligence Series
Asteroid Observations - Real Time Operational Intelligence SeriesAsteroid Observations - Real Time Operational Intelligence Series
Asteroid Observations - Real Time Operational Intelligence Series
StormBourne, LLC
 
EAC Project Report 2014
EAC Project Report 2014EAC Project Report 2014
EAC Project Report 2014seemeen gul
 
Kurston resume edited
Kurston resume editedKurston resume edited
Kurston resume edited
Kurston Timothy
 
Chef Robby Goco: Best Practices of Sustainable Farm to Table Restaurants
Chef Robby Goco: Best Practices of Sustainable Farm to Table Restaurants Chef Robby Goco: Best Practices of Sustainable Farm to Table Restaurants
Chef Robby Goco: Best Practices of Sustainable Farm to Table Restaurants
courageasia
 
Semana santa
Semana santaSemana santa
Semana santa
caramucha
 
Baileyhooper Crowsnest
Baileyhooper CrowsnestBaileyhooper Crowsnest
Baileyhooper Crowsnestbaileymarie
 
ECONOMIC EMPOWERMENT CHART OF LEGAL REFORMS OF COUNTRIES 2015
ECONOMIC EMPOWERMENT CHART OF LEGAL REFORMS OF COUNTRIES 2015ECONOMIC EMPOWERMENT CHART OF LEGAL REFORMS OF COUNTRIES 2015
ECONOMIC EMPOWERMENT CHART OF LEGAL REFORMS OF COUNTRIES 2015seemeen gul
 
портфоліо нагорна олена
портфоліо нагорна оленапортфоліо нагорна олена
портфоліо нагорна олена
olena Nahorna
 
Web. 2
Web. 2Web. 2
Dr. Saul Villeda at Health Extension Salon #6
Dr. Saul Villeda at Health Extension Salon #6Dr. Saul Villeda at Health Extension Salon #6
Dr. Saul Villeda at Health Extension Salon #6
Health_Extension
 
The machine wca 2012
The machine wca 2012The machine wca 2012
The machine wca 2012w carraro
 
"Graficos de Excel"
"Graficos de Excel""Graficos de Excel"
"Graficos de Excel"
Maximiliano Nieves
 
Oracle Data Visualization Cloud Service
Oracle Data Visualization Cloud ServiceOracle Data Visualization Cloud Service
Oracle Data Visualization Cloud Service
Hisashi Igarashi
 
Sistem limfatik
Sistem limfatikSistem limfatik
Sistem limfatik
Surya Aldy
 
Retreat (Resource Efficient TERI Retreat for Environmental Awareness and Trai...
Retreat (Resource Efficient TERI Retreat for Environmental Awareness and Trai...Retreat (Resource Efficient TERI Retreat for Environmental Awareness and Trai...
Retreat (Resource Efficient TERI Retreat for Environmental Awareness and Trai...
Soumi Bera
 
Parco Montara (Architectural Thesis Portfolio)
Parco Montara (Architectural Thesis Portfolio)Parco Montara (Architectural Thesis Portfolio)
Parco Montara (Architectural Thesis Portfolio)
Ricardo Ostolaza
 

Viewers also liked (17)

Asteroid Observations - Real Time Operational Intelligence Series
Asteroid Observations - Real Time Operational Intelligence SeriesAsteroid Observations - Real Time Operational Intelligence Series
Asteroid Observations - Real Time Operational Intelligence Series
 
EAC Project Report 2014
EAC Project Report 2014EAC Project Report 2014
EAC Project Report 2014
 
Kurston resume edited
Kurston resume editedKurston resume edited
Kurston resume edited
 
Chef Robby Goco: Best Practices of Sustainable Farm to Table Restaurants
Chef Robby Goco: Best Practices of Sustainable Farm to Table Restaurants Chef Robby Goco: Best Practices of Sustainable Farm to Table Restaurants
Chef Robby Goco: Best Practices of Sustainable Farm to Table Restaurants
 
Semana santa
Semana santaSemana santa
Semana santa
 
Baileyhooper Crowsnest
Baileyhooper CrowsnestBaileyhooper Crowsnest
Baileyhooper Crowsnest
 
ECONOMIC EMPOWERMENT CHART OF LEGAL REFORMS OF COUNTRIES 2015
ECONOMIC EMPOWERMENT CHART OF LEGAL REFORMS OF COUNTRIES 2015ECONOMIC EMPOWERMENT CHART OF LEGAL REFORMS OF COUNTRIES 2015
ECONOMIC EMPOWERMENT CHART OF LEGAL REFORMS OF COUNTRIES 2015
 
портфоліо нагорна олена
портфоліо нагорна оленапортфоліо нагорна олена
портфоліо нагорна олена
 
Web. 2
Web. 2Web. 2
Web. 2
 
Dr. Saul Villeda at Health Extension Salon #6
Dr. Saul Villeda at Health Extension Salon #6Dr. Saul Villeda at Health Extension Salon #6
Dr. Saul Villeda at Health Extension Salon #6
 
The machine wca 2012
The machine wca 2012The machine wca 2012
The machine wca 2012
 
Eligibility Letter
Eligibility LetterEligibility Letter
Eligibility Letter
 
"Graficos de Excel"
"Graficos de Excel""Graficos de Excel"
"Graficos de Excel"
 
Oracle Data Visualization Cloud Service
Oracle Data Visualization Cloud ServiceOracle Data Visualization Cloud Service
Oracle Data Visualization Cloud Service
 
Sistem limfatik
Sistem limfatikSistem limfatik
Sistem limfatik
 
Retreat (Resource Efficient TERI Retreat for Environmental Awareness and Trai...
Retreat (Resource Efficient TERI Retreat for Environmental Awareness and Trai...Retreat (Resource Efficient TERI Retreat for Environmental Awareness and Trai...
Retreat (Resource Efficient TERI Retreat for Environmental Awareness and Trai...
 
Parco Montara (Architectural Thesis Portfolio)
Parco Montara (Architectural Thesis Portfolio)Parco Montara (Architectural Thesis Portfolio)
Parco Montara (Architectural Thesis Portfolio)
 

Similar to Privacy preserving and truthful detection of packet dropping attacks in wireless ad hoc networks

Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
jpstudcorner
 
Adaptive distributed outlier detection for ws ns
Adaptive distributed outlier detection for ws nsAdaptive distributed outlier detection for ws ns
Adaptive distributed outlier detection for ws ns
LogicMindtech Nologies
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
LogicMindtech Nologies
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
LogicMindtech Nologies
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
LogicMindtech Nologies
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17
redpel dot com
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
LeMeniz Infotech
 
Securing BGP by Handling Dynamic Network Behavior and Unbalanced Datasets
Securing BGP by Handling Dynamic Network Behavior and Unbalanced DatasetsSecuring BGP by Handling Dynamic Network Behavior and Unbalanced Datasets
Securing BGP by Handling Dynamic Network Behavior and Unbalanced Datasets
IJCNCJournal
 
Secure computing for java and dot net
Secure computing for java and dot netSecure computing for java and dot net
Secure computing for java and dot netredpel dot com
 
JPJ1431 top-k Query Result Completeness Verification
JPJ1431   top-k Query Result Completeness VerificationJPJ1431   top-k Query Result Completeness Verification
JPJ1431 top-k Query Result Completeness Verification
chennaijp
 
A lightweight secure scheme for detecting
A lightweight secure scheme for detectingA lightweight secure scheme for detecting
A lightweight secure scheme for detecting
jpstudcorner
 
Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...
LogicMindtech Nologies
 
Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...
LogicMindtech Nologies
 
Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...
LogicMindtech Nologies
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
Vijay Karan
 
Networking project list for java and dotnet
Networking project list for java and dotnetNetworking project list for java and dotnet
Networking project list for java and dotnet
redpel dot com
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
IEEEBEBTECHSTUDENTSPROJECTS
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
Vijay Karan
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...
IJNSA Journal
 

Similar to Privacy preserving and truthful detection of packet dropping attacks in wireless ad hoc networks (20)

Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
 
Adaptive distributed outlier detection for ws ns
Adaptive distributed outlier detection for ws nsAdaptive distributed outlier detection for ws ns
Adaptive distributed outlier detection for ws ns
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
 
Securing BGP by Handling Dynamic Network Behavior and Unbalanced Datasets
Securing BGP by Handling Dynamic Network Behavior and Unbalanced DatasetsSecuring BGP by Handling Dynamic Network Behavior and Unbalanced Datasets
Securing BGP by Handling Dynamic Network Behavior and Unbalanced Datasets
 
Secure computing for java and dot net
Secure computing for java and dot netSecure computing for java and dot net
Secure computing for java and dot net
 
JPJ1431 top-k Query Result Completeness Verification
JPJ1431   top-k Query Result Completeness VerificationJPJ1431   top-k Query Result Completeness Verification
JPJ1431 top-k Query Result Completeness Verification
 
A lightweight secure scheme for detecting
A lightweight secure scheme for detectingA lightweight secure scheme for detecting
A lightweight secure scheme for detecting
 
Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...
 
Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...Development of a secure routing protocol using game theory model in mobile ad...
Development of a secure routing protocol using game theory model in mobile ad...
 
Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Networking project list for java and dotnet
Networking project list for java and dotnetNetworking project list for java and dotnet
Networking project list for java and dotnet
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...
 

More from LogicMindtech Nologies

Utilizing image scales towards totally training free blind image quality asse...
Utilizing image scales towards totally training free blind image quality asse...Utilizing image scales towards totally training free blind image quality asse...
Utilizing image scales towards totally training free blind image quality asse...
LogicMindtech Nologies
 
Thermal imaging as a biometrics approach to facial signature authentication
Thermal imaging as a biometrics approach to facial signature authenticationThermal imaging as a biometrics approach to facial signature authentication
Thermal imaging as a biometrics approach to facial signature authentication
LogicMindtech Nologies
 
Template ip
Template ipTemplate ip
Targeting accurate object extraction from an image a comprehensive study of ...
Targeting accurate object extraction from an image  a comprehensive study of ...Targeting accurate object extraction from an image  a comprehensive study of ...
Targeting accurate object extraction from an image a comprehensive study of ...
LogicMindtech Nologies
 
Sparse dissimilarity constrained coding for glaucoma screening
Sparse dissimilarity constrained coding for glaucoma screeningSparse dissimilarity constrained coding for glaucoma screening
Sparse dissimilarity constrained coding for glaucoma screening
LogicMindtech Nologies
 
Sar sift a sift like algorithm for sar images
Sar sift  a sift like algorithm for sar imagesSar sift  a sift like algorithm for sar images
Sar sift a sift like algorithm for sar images
LogicMindtech Nologies
 
Optic disc boundary and vessel origin
Optic disc boundary and vessel originOptic disc boundary and vessel origin
Optic disc boundary and vessel origin
LogicMindtech Nologies
 
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
LogicMindtech Nologies
 
Multi scale two-directional two-dimensional
Multi scale two-directional two-dimensionalMulti scale two-directional two-dimensional
Multi scale two-directional two-dimensional
LogicMindtech Nologies
 
Measuring calorie and nutrition from food image
Measuring calorie and nutrition from food imageMeasuring calorie and nutrition from food image
Measuring calorie and nutrition from food image
LogicMindtech Nologies
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
LogicMindtech Nologies
 
Joint super resolution and denoising from a single depth image
Joint super resolution and denoising from a single depth imageJoint super resolution and denoising from a single depth image
Joint super resolution and denoising from a single depth image
LogicMindtech Nologies
 
Iterative vessel segmentation of fundus images
Iterative vessel segmentation of fundus imagesIterative vessel segmentation of fundus images
Iterative vessel segmentation of fundus images
LogicMindtech Nologies
 
Influence of color to gray conversion on the performance of document image bi...
Influence of color to gray conversion on the performance of document image bi...Influence of color to gray conversion on the performance of document image bi...
Influence of color to gray conversion on the performance of document image bi...
LogicMindtech Nologies
 
Improving pixel based change detection accuracy using an object-based approac...
Improving pixel based change detection accuracy using an object-based approac...Improving pixel based change detection accuracy using an object-based approac...
Improving pixel based change detection accuracy using an object-based approac...
LogicMindtech Nologies
 
Image quality assessment for fake biometric detection application to iris f...
Image quality assessment for fake biometric detection  application to iris  f...Image quality assessment for fake biometric detection  application to iris  f...
Image quality assessment for fake biometric detection application to iris f...
LogicMindtech Nologies
 
Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...
LogicMindtech Nologies
 
Haze removal for a single remote sensing image based on deformed haze imaging...
Haze removal for a single remote sensing image based on deformed haze imaging...Haze removal for a single remote sensing image based on deformed haze imaging...
Haze removal for a single remote sensing image based on deformed haze imaging...
LogicMindtech Nologies
 
Face recognition by exploiting local gabor
Face recognition by exploiting local gaborFace recognition by exploiting local gabor
Face recognition by exploiting local gabor
LogicMindtech Nologies
 
Enhancing color images of extremely low light scenes based on rgb nir images ...
Enhancing color images of extremely low light scenes based on rgb nir images ...Enhancing color images of extremely low light scenes based on rgb nir images ...
Enhancing color images of extremely low light scenes based on rgb nir images ...
LogicMindtech Nologies
 

More from LogicMindtech Nologies (20)

Utilizing image scales towards totally training free blind image quality asse...
Utilizing image scales towards totally training free blind image quality asse...Utilizing image scales towards totally training free blind image quality asse...
Utilizing image scales towards totally training free blind image quality asse...
 
Thermal imaging as a biometrics approach to facial signature authentication
Thermal imaging as a biometrics approach to facial signature authenticationThermal imaging as a biometrics approach to facial signature authentication
Thermal imaging as a biometrics approach to facial signature authentication
 
Template ip
Template ipTemplate ip
Template ip
 
Targeting accurate object extraction from an image a comprehensive study of ...
Targeting accurate object extraction from an image  a comprehensive study of ...Targeting accurate object extraction from an image  a comprehensive study of ...
Targeting accurate object extraction from an image a comprehensive study of ...
 
Sparse dissimilarity constrained coding for glaucoma screening
Sparse dissimilarity constrained coding for glaucoma screeningSparse dissimilarity constrained coding for glaucoma screening
Sparse dissimilarity constrained coding for glaucoma screening
 
Sar sift a sift like algorithm for sar images
Sar sift  a sift like algorithm for sar imagesSar sift  a sift like algorithm for sar images
Sar sift a sift like algorithm for sar images
 
Optic disc boundary and vessel origin
Optic disc boundary and vessel originOptic disc boundary and vessel origin
Optic disc boundary and vessel origin
 
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
On criminalidentificationin color skin images usingskin marks (rppvsm) and fu...
 
Multi scale two-directional two-dimensional
Multi scale two-directional two-dimensionalMulti scale two-directional two-dimensional
Multi scale two-directional two-dimensional
 
Measuring calorie and nutrition from food image
Measuring calorie and nutrition from food imageMeasuring calorie and nutrition from food image
Measuring calorie and nutrition from food image
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
 
Joint super resolution and denoising from a single depth image
Joint super resolution and denoising from a single depth imageJoint super resolution and denoising from a single depth image
Joint super resolution and denoising from a single depth image
 
Iterative vessel segmentation of fundus images
Iterative vessel segmentation of fundus imagesIterative vessel segmentation of fundus images
Iterative vessel segmentation of fundus images
 
Influence of color to gray conversion on the performance of document image bi...
Influence of color to gray conversion on the performance of document image bi...Influence of color to gray conversion on the performance of document image bi...
Influence of color to gray conversion on the performance of document image bi...
 
Improving pixel based change detection accuracy using an object-based approac...
Improving pixel based change detection accuracy using an object-based approac...Improving pixel based change detection accuracy using an object-based approac...
Improving pixel based change detection accuracy using an object-based approac...
 
Image quality assessment for fake biometric detection application to iris f...
Image quality assessment for fake biometric detection  application to iris  f...Image quality assessment for fake biometric detection  application to iris  f...
Image quality assessment for fake biometric detection application to iris f...
 
Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...
 
Haze removal for a single remote sensing image based on deformed haze imaging...
Haze removal for a single remote sensing image based on deformed haze imaging...Haze removal for a single remote sensing image based on deformed haze imaging...
Haze removal for a single remote sensing image based on deformed haze imaging...
 
Face recognition by exploiting local gabor
Face recognition by exploiting local gaborFace recognition by exploiting local gabor
Face recognition by exploiting local gabor
 
Enhancing color images of extremely low light scenes based on rgb nir images ...
Enhancing color images of extremely low light scenes based on rgb nir images ...Enhancing color images of extremely low light scenes based on rgb nir images ...
Enhancing color images of extremely low light scenes based on rgb nir images ...
 

Recently uploaded

space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 

Recently uploaded (20)

space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 

Privacy preserving and truthful detection of packet dropping attacks in wireless ad hoc networks

  • 1. Logic Mind Technologies Vijayangar (Near Maruthi Medicals), Bangalore-40 Ph: 8123668124 // 8123668066 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks Abstract Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. To improve the detection accuracy, we propose to exploit the correlations between lost packets. Furthermore, to ensure truthful calculation of these correlations, we develop a homomorphic linear authenticator (HLA) based public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This construction is privacy preserving, collusion proof, and incurs low communication and storage overheads. To reduce the computation overhead of the baseline scheme, a packet-block-based mechanism is also proposed, which allows one to trade detection accuracy for lower computation complexity. Through extensive simulations, we verify that the proposed mechanisms achieve significantly better detection accuracy than conventional methods such as a maximum-likelihood based detection.
  • 2. SYSTEM SPECIFICATION Software Specification Operating system : Linux (Ubuntu) Software : Network Simulator 2.35 Programming languages : Tool Command Language, AWK, C++ Hardware Specification Main processor : Dual Core Hard disk capacity : 80GB Cache memory : 2 GB PROJECT FLOW: First Review: Literature Survey Paper Explanation Design of Project Project Enhancement explanation Second Review: Implementing 40% of Base Paper Third Review Implementing Remaining 60% of Base Paper with Future Enhancement (Modification) For More Details please contact Logic Mind Technologies Vijayangar (NearMaruthi Medicals), Bangalore-40 Ph: 8123668124 // 8123668066 Mail: logicmindtech@gmail.com