Preventing Packet Dropping Attacks in Wireless Ad Hoc Networks (original) (raw)

Detection of Packet Dropping Attacks for Privacy Preservation in Wireless Ad-Hoc Networks

— There are usually two types of packet dropping attacks observed in the network. Link error and malicious packet dropping are the sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a number of packet losses in the network, one should concentrate on how the packets are lost in a network, whether the packets dropped are caused by link errors only or by the combinational effect of link errors and malicious dropping. Here, particularly certain cases are displayed where it's one of nodes in the network, whereby malicious nodes exploit their knowledge of the routing context to drop a small amount of packets that are critical to the network performance. Because the packet dropping rate in this case is similar to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. For the enhancement of the detection accuracy, a scheme to attain the interrelationships between lost packets is proposed. Furthermore, to ensure truthful calculation of these correlations, development of a Homomorphic Linear Authenticator (HLA) based public auditing architecture that allows the detector to validate the truthfulness of the packet drop information reported by nodes. This establishment is privacy preserving, collaboration proof, and incurs low communication and limited storage.

HLA BASED SOLUTION FOR PACKET LOSS DETECTION IN MOBILE AD HOC NETWORKS

Packet drooping is one of the concerns in wireless networks. It is there in Mobile Ad Hoc Networks (MANETs) as well. MANET is the network which is established when situation demands for effective communications. Nodes in the network act as both sender and receiver of data packets. When data packets are reaching destination as sent by the sender, it is perfectly ok. However, it is seen generally some packets are lost while transmitting data. Data loss can occur due to either bad channel conditions or malicious attacks. Finding the reason behind packet loss besides detecting packet loss is very important in mobile networks. In this paper, we proposed and implemented a solution for this problem. Our solution is based on Homomorphic Linear Authenticator (HLA). It is used to detect packet loss and find the reason for it. The solution is implemented with a custom simulator build in Java programming language. The results showed the utility of the proposed approach.

A NOVEL METHOD TO DETECT THE TRUSTWORTHY OF PACKET DROPPING ATTACKS IN A WIRELESS AD-HOC NETWORKS

International Journal of Computer Application, 2017

Network is an interconnection of various systems in order to transfer the information from one location to other location through some physical medium. Generally networks are classified into various types based on the usage and configuration. Client-Server Architecture (CSA) is one among the various types of networks, where a client will have only facility like sending a request to the server and the server will always generates a response to requested client. As we all know that the data or information in the network is mainly divided into packets of equal sizes. However during communication there may occur some packets loss between nodes due to the reason like edge cut or node cut, this mainly happens due to inactiveness of some intermediate nodes. If any node during the communication becomes inactive it will lead to a network cut between the consecutive nodes which may sometimes leads to edge cut. The main two sources for packet losses in a multi hop wireless ad hoc networks are link error and malicious packet dropping attacks. In this proposed thesis, we for the first time observed a sequence of packet losses in the network in order to identify, whether the packet losses occurred by link errors, or by the problems like malicious packet drop and link error both the attacks at a time during communication. Also we proposed a novel homomorphic linear authenticator (NHLA) based on public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by intermediate nodes that are available inside the network. As an extension we have implemented the proposed thesis with a new type of attack like energy or bandwidth attack, where the packet loss can be identified if any bandwidth or change has occurred over network during data communication. Also we included a new concept like block of users if they wish to do more than or equal to three failed transactions in a single session.

Sustaining Privacy and Correct Identification of Packet Loss in Ad Hoc Networks

In wireless network there is high possibility of packet loss. Packet loss can happen in view of association of both link errors and malevolent node or by the effect of single one of it. This malevolent node may be the insider attack in the network responsible for packet loss. Existing techniques to identify the source of packet loss uses cryptographic methods loss but these are applicable only when the packet are highly selective. In this the link errors may not be altogether littler than the packet dropping rate of the insider attack. To ensure precise computation of these correlations, we develop a Homomorphic Linear Authenticator (HLA) based public auditing architecture that assists the detector to verify the correctness of the packet loss information described by the nodes. HLA act like an evaluator to identify the packet losing in the system. The main advantage of this scheme will securely transmit the data in wireless Ad-Hoc network. We also use the ACF (auto-correlation function) to calculate the position of lost packets. This framework with new HLA development is conspiracy evidence and acquires low correspondence cost.

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. To improve the detection accuracy, we propose to exploit the correlations between lost packets. Furthermore, to ensure truthful calculation of these correlations, we develop a homomorphic linear authenticator (HLA) based public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This construction is privacy preserving, collusion proof, and incurs low communication and storage overheads. To reduce the computation overhead of the baseline scheme, a packet-block-based mechanism is also proposed, which allows one to trade detection accuracy for lower computation complexity. Through extensive simulations, we verify that the proposed mechanisms achieve significantly better detection accuracy than conventional methods such as a maximum-likelihood based detection.

Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop Attack

In wireless ad hoc network packets are loosed due to two conditions one is due to the perturbance in the channel and another one is due to the intrusion (i.e.) intruder discard the packet. In this paper we fixate on the inner attack (i.e.) the assailment caused by the intruder who malevolently discards the packets. The malevolent node pretends to be an one of the node in the routing path and cause the assailment. Conventional algorithm does not provide the efficient detection of packet loss so, In order to ameliorate the detection accurately we propose correlation function and withal for the correct calculation of correlation we implement BLS predicated Homomorphism Linear Authenticator to check the information provided by the node are true. The HLA architecture provides privacy preserving, collusion proof and sanctions low communication and storage overheads.

Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc Networks

International Journal of Network Security & Its Applications, 2013

Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are various security issues and problems. Two most important issues are interoperability and interaction among various security technologies which are very important to consider for configuration and management point of view. The packet drop ratio in the wireless network is very high as well as packets may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless networks. Hence, there is the need of effective intrusion detection system which can detect maximum number of intruders and the corresponding packets be forwarded through some alternate paths in the network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the performance of WLAN.

Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks

2009 IEEE International Conference on Communications, 2009

Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the detection of malicious packet drops in the presence of collisions and channel errors and describe a method to distinguish between these types. We present a simple analytical model for packet loss that helps a monitoring node to detect malicious packet dropping attacks. The model is analyzed and evaluated using simulations. The results show that it is possible to detect malicious packet drops in the presence of collisions and channel errors.