A NOVEL METHOD TO DETECT THE TRUSTWORTHY OF PACKET DROPPING ATTACKS IN A WIRELESS AD-HOC NETWORKS (original) (raw)
Related papers
Preventing Packet Dropping Attacks in Wireless Ad Hoc Networks
2019
In multi-hop wireless ad HOC network, for packet loses they are two sources such as linked error and malicious drop. Now, we are going to check whether the number of packet loses present in the network are effected by link errors (or) by the combination of link error and malicious drop. Our own selves are we keenly observing the insider, attack case, one part of the route exploit is malicious node, their communication knowledge particularly choose a small amount of packet adverse to the network performance by virtue of error channel rate is compared to the case of packet dropping rate .The packet loss rate which is detected by using detecting algorithms is inadequate. To enhance detection preciseness we suggest utilizing the core relations between lost packets and we introduce you to a Homomorphism Linear Authenticator (HLA). HLA enables the detector to uphold the information of packet loss.
Detection of Packet Dropping Attacks for Privacy Preservation in Wireless Ad-Hoc Networks
— There are usually two types of packet dropping attacks observed in the network. Link error and malicious packet dropping are the sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a number of packet losses in the network, one should concentrate on how the packets are lost in a network, whether the packets dropped are caused by link errors only or by the combinational effect of link errors and malicious dropping. Here, particularly certain cases are displayed where it's one of nodes in the network, whereby malicious nodes exploit their knowledge of the routing context to drop a small amount of packets that are critical to the network performance. Because the packet dropping rate in this case is similar to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. For the enhancement of the detection accuracy, a scheme to attain the interrelationships between lost packets is proposed. Furthermore, to ensure truthful calculation of these correlations, development of a Homomorphic Linear Authenticator (HLA) based public auditing architecture that allows the detector to validate the truthfulness of the packet drop information reported by nodes. This establishment is privacy preserving, collaboration proof, and incurs low communication and limited storage.
AUDITING BASED TECHNIQUE FOR IDENTIFICATION OF MALICIOUS PACKET DROPPING IN MANET
2019
MANET is multi hop ad-hoc networks and nodes in that can acts as sender or receiver or relay. Packet drooping is one of the main concerns and the packet loss can be occurred by link errors and malicious packet dropping. The main purpose of this work is to develop an accurate algorithm for detecting selective packet drops made by insider attackers and to improve the detection accuracy, to differentiate whether packet loss is caused due to link error or activity of the attacker by exploiting the correlations between lost packets and to detect packet dropping attacks in mobile environment. The packet dropping in this case is nearly equal to the normal link error because of which existing algorithm that are based on detecting the packet loss rate cannot find the exact cause of packet loss. Hence to improve the detection accuracy, the correlations between lost packets is identified. The technique called Homomorphism Linear Authenticator (HLA) based public auditing architecture is developed that allows the detector to verify the truthfulness of packet loss information reported by nodes. This architecture is privacy preserving, collusion proof and incurs low communication and storage overheads. Hence to improve the detection accuracy, the correlations between the bitmap generated are calculated and lost packets are identified. The public auditing architecture is developed that detects and verifies the truthfulness of the packet loss information reported by nodes.
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. To improve the detection accuracy, we propose to exploit the correlations between lost packets. Furthermore, to ensure truthful calculation of these correlations, we develop a homomorphic linear authenticator (HLA) based public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This construction is privacy preserving, collusion proof, and incurs low communication and storage overheads. To reduce the computation overhead of the baseline scheme, a packet-block-based mechanism is also proposed, which allows one to trade detection accuracy for lower computation complexity. Through extensive simulations, we verify that the proposed mechanisms achieve significantly better detection accuracy than conventional methods such as a maximum-likelihood based detection.
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop Attack
In wireless ad hoc network packets are loosed due to two conditions one is due to the perturbance in the channel and another one is due to the intrusion (i.e.) intruder discard the packet. In this paper we fixate on the inner attack (i.e.) the assailment caused by the intruder who malevolently discards the packets. The malevolent node pretends to be an one of the node in the routing path and cause the assailment. Conventional algorithm does not provide the efficient detection of packet loss so, In order to ameliorate the detection accurately we propose correlation function and withal for the correct calculation of correlation we implement BLS predicated Homomorphism Linear Authenticator to check the information provided by the node are true. The HLA architecture provides privacy preserving, collusion proof and sanctions low communication and storage overheads.
A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks
Proceedings of the International Conference on Telecommunications and Malaysian International Conference on Communications (ICT-MICC’07), May 14-17, Penang, Malaysia. Paper ID: 74, Track: 3: Ad Hoc Routing and Protocol I., 2007
In multi-hop mobile ad hoc networks (MANETs), mobile nodes cooperate with each other without using any infrastructure such as access points or base stations. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Among the various attacks to which MANETs are vulnerable, malicious packet dropping attack is very common where a malicious node can partially degrade or completely disrupt communication in the network by consistently dropping packets. In this paper, a mechanism for detection of packet dropping attack is presented based on cooperative participation of the nodes in a MANET. The redundancy of routing information in an ad hoc network is utilized to make the scheme robust so that it works effectively even in presence of transient network partitioning and Byzantine failure of nodes. The proposed scheme is fully cooperative and thus more secure as the vulnerabilities of any election algorithm used for choosing a subset of nodes for cooperation are absent. Simulation results show the effectiveness of the protocol.
PLACATE PACKET DROPPING ATTACK USING SECURE ROUTING PROTOCOL AND INCENTIVE BASED MECHANISM
Ad-hoc networks are established voluntarily without the use of any framework or centralized management. This type of system infers that each node, or user, in the network can act as a data endpoint or intermediate node. Routing in between these nodes is established by using routing protocols. Several protocols for secure routing in adhoc networks have been proposed in the literature. But because of their drawbacks there is a necessity to make them strong and secure and these nodes are used to transfer the data from source location to destination. Whenever the nodes transfers data then the nodes has to utilize some resources like energy, storage capacity and bandwidth. So that some nodes of the network may not send data to their neighbor nodes. In this paper we use secure based routing protocol watchdog to identify misbehaving nodes and we propose incentive based mechanism to avoid selfish nodes in order to mitigate the packet dropping attack.
Sustaining Privacy and Correct Identification of Packet Loss in Ad Hoc Networks
In wireless network there is high possibility of packet loss. Packet loss can happen in view of association of both link errors and malevolent node or by the effect of single one of it. This malevolent node may be the insider attack in the network responsible for packet loss. Existing techniques to identify the source of packet loss uses cryptographic methods loss but these are applicable only when the packet are highly selective. In this the link errors may not be altogether littler than the packet dropping rate of the insider attack. To ensure precise computation of these correlations, we develop a Homomorphic Linear Authenticator (HLA) based public auditing architecture that assists the detector to verify the correctness of the packet loss information described by the nodes. HLA act like an evaluator to identify the packet losing in the system. The main advantage of this scheme will securely transmit the data in wireless Ad-Hoc network. We also use the ACF (auto-correlation function) to calculate the position of lost packets. This framework with new HLA development is conspiracy evidence and acquires low correspondence cost.