SlideShare a Scribd company logo
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 1Page number 1
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Privacy-Preserving and Truthful Detection of
Packet Dropping Attacks in Wireless Ad Hoc
Networks
Abstract
Link error and malicious packet dropping are two sources for
packet losses in multi-hop wireless ad hoc network. In this paper, while
observing a sequence of packet losses in the network, we are interested
in determining whether the losses are caused by link errors only, or by
the combined effect of link errors and malicious drop. We are especially
interested in the insider-attack case, whereby malicious nodes that are
part of the route exploit their knowledge of the communication context
to selectively drop a small amount of packets critical to the network
performance. Because the packet dropping rate in this case is
comparable to the channel error rate, conventional algorithms that are
based on detecting the packet loss rate cannot achieve satisfactory
detection accuracy. To improve the detection accuracy, we propose to
exploit the correlations between lost packets. Furthermore, to ensure
truthful calculation of these correlations, we develop a homomorphic
linear authenticator (HLA) based public auditing architecture that allows
the detector to verify the truthfulness of the packet loss information
reported by nodes. This construction is privacy preserving, collusion
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 2Page number 2
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
proof, and incurs low communication and storage overheads. To reduce
the computation overhead of the baseline scheme, a packet-block-based
mechanism is also proposed, which allows one to trade detection
accuracy for lower computation complexity. Through extensive
simulations, we verify that the proposed mechanisms achieve
significantly better detection accuracy than conventional methods such
as a maximum-likelihood based detection.
EXISTING SYSTEM
In existing system, Link error and malicious packet dropping are
two sources for packet losses in multi-hop wireless ad hoc network.
Conventional algorithms that are based on detecting the packet loss rate
cannot achieve satisfactory detection accuracy
DRAWBACK OF EXISTING SYSTEM
 Privacy preserving, collusion proof, and incurs low communication
and storage overheads.
 Sequence of packet losses
PROPOSED SYSTEM
To improve the detection accuracy, we propose to exploit the
correlations between lost packets and to ensure truthful calculation of
these correlations, we develop a homomorphic linear authenticator
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 3Page number 3
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
(HLA) based public auditing architecture that allows the detector to
verify the truthfulness of the packet loss information reported by nodes.
To reduce the computation overhead of the baseline scheme, a packet-
block-based mechanism is also proposed, which allows one to trade
detection accuracy for lower computation complexity. Through
extensive simulations, we verify that the proposed mechanisms achieve
significantly better detection accuracy than conventional methods such
as a maximum-likelihood based detection.
ADVANTAGE OF PROPOSED SYSTEM
 Easy to be detected the pocket loss
 Easy to detect and mitigate.
 Threats completely eliminated from network routing table.
SYSTEM SPECIFICATION
Hardware Requirements
System : Pentium IV 2.4 GHz
Hard Disk : 40 GB
Floppy Drive : 1.44 Mb
Monitor : 15 VGA Colour
Mouse : Logitech
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 4Page number 4
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Ram : 512 Mb
Software Requirements
Operating system : Windows Family
Tools : eclipse/Netbeans
Technology Used : Java
Backend Used : SQL Server

More Related Content

DOCX
Privacy preserving and truthful detection of packet dropping attacks in wirel...
DOCX
Privacy preserving and truthful detection
PDF
Privacy preserving and truthful detection of packet dropping attacks in wirel...
DOCX
Privacy preserving and truthful detection of packet dropping attacks in wirel...
PDF
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
DOCX
Privacy preserving and truthful detection of packet dropping attacks in wirel...
PDF
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
PDF
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
Privacy preserving and truthful detection of packet dropping attacks in wirel...
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...

What's hot (16)

PDF
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
PDF
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
DOCX
a probabilistic misbehavior detection scheme toward efficient trust establish...
PDF
Adopting hybrid cryptography technique for reduction of network overhead in m...
DOCX
Defending against collaborative attacks by
PDF
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
PPTX
Defending against collaborative attacks by malicious nodes in manets a cooper...
PDF
A43030104
PDF
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
DOCX
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
PDF
Performance analysis of transport layer basedhybrid covert channel detection ...
PDF
Defending against collaborative attacks by
PDF
TAM new report
DOCX
Hop by hop message authentication chapter 1
PDF
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
DOCX
Random walk based approach to detect clone attacks in wireless sensor networks
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
a probabilistic misbehavior detection scheme toward efficient trust establish...
Adopting hybrid cryptography technique for reduction of network overhead in m...
Defending against collaborative attacks by
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
Defending against collaborative attacks by malicious nodes in manets a cooper...
A43030104
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
Performance analysis of transport layer basedhybrid covert channel detection ...
Defending against collaborative attacks by
TAM new report
Hop by hop message authentication chapter 1
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
Random walk based approach to detect clone attacks in wireless sensor networks
Ad

Viewers also liked (17)

DOCX
system requirement for network simulator projects
PDF
8391 11758-1-sm
PDF
An enhanced islanding microgrid reactive power, imbalance power, and harmonic...
PDF
Bulk ieee projects | bulk ieee projects in pondicherry
PPTX
Работа с недовольными клиентами. Алеся Задворнова (Фламп)
PPTX
Death wire
PDF
A category-theoretic view of model-driven
PPTX
My ppt game carlos suarez
DOCX
Supporting privacy protection in personalized web search
PPTX
PDF
Swedish_Technology_Look_And_Feel
PDF
BATERIAS ETNA
PPTX
Мария Губайдуллина (Registratura.ru) о лояльности в SMM
PPT
Vision presentation
PPTX
Technology will save our minds and bodies rochelle
PDF
Kosrae Nautilus Resort
PPTX
Issues with Social Media News Gathering
system requirement for network simulator projects
8391 11758-1-sm
An enhanced islanding microgrid reactive power, imbalance power, and harmonic...
Bulk ieee projects | bulk ieee projects in pondicherry
Работа с недовольными клиентами. Алеся Задворнова (Фламп)
Death wire
A category-theoretic view of model-driven
My ppt game carlos suarez
Supporting privacy protection in personalized web search
Swedish_Technology_Look_And_Feel
BATERIAS ETNA
Мария Губайдуллина (Registratura.ru) о лояльности в SMM
Vision presentation
Technology will save our minds and bodies rochelle
Kosrae Nautilus Resort
Issues with Social Media News Gathering
Ad

Similar to Privacy preserving and truthful detection of packet dropping attacks in wireless ad hoc networks (10)

DOCX
Privacy preserving and truthful detection of packet
PPTX
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
DOCX
Privacy preserving and truthful detection
PDF
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
PDF
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
PDF
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
PDF
Survey on Different Packet Drop Detection Techniques in Mobile AdHoc Network
PDF
A lightweight secure scheme for detecting provenance forgery and packet drop ...
PDF
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
PDF
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
Privacy preserving and truthful detection of packet
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy preserving and truthful detection
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Survey on Different Packet Drop Detection Techniques in Mobile AdHoc Network
A lightweight secure scheme for detecting provenance forgery and packet drop ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...

More from LeMeniz Infotech (20)

PDF
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
PDF
A fast fault tolerant architecture for sauvola local image thresholding algor...
PDF
A dynamically reconfigurable multi asip architecture for multistandard and mu...
PDF
Interleaved digital power factor correction based on the sliding mode approach
PDF
Bumpless control for reduced thd in power factor correction circuits
PDF
A bidirectional single stage three phase rectifier with high-frequency isolat...
PDF
A bidirectional three level llc resonant converter with pwam control
PDF
Efficient single phase transformerless inverter for grid tied pvg system with...
PDF
Highly reliable transformerless photovoltaic inverters with leakage current a...
PDF
Grid current-feedback active damping for lcl resonance in grid-connected volt...
PDF
Delay dependent stability of single-loop controlled grid-connected inverters ...
PDF
Connection of converters to a low and medium power dc network using an induct...
PDF
Stamp enabling privacy preserving location proofs for mobile users
PDF
Sbvlc secure barcode based visible light communication for smartphones
PDF
Read2 me a cloud based reading aid for the visually impaired
PDF
Privacy preserving location sharing services for social networks
PDF
Pass byo bring your own picture for securing graphical passwords
PDF
Eplq efficient privacy preserving location-based query over outsourced encryp...
PDF
Analyzing ad library updates in android apps
PDF
An exploration of geographic authentication scheme
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast fault tolerant architecture for sauvola local image thresholding algor...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
Interleaved digital power factor correction based on the sliding mode approach
Bumpless control for reduced thd in power factor correction circuits
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional three level llc resonant converter with pwam control
Efficient single phase transformerless inverter for grid tied pvg system with...
Highly reliable transformerless photovoltaic inverters with leakage current a...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Delay dependent stability of single-loop controlled grid-connected inverters ...
Connection of converters to a low and medium power dc network using an induct...
Stamp enabling privacy preserving location proofs for mobile users
Sbvlc secure barcode based visible light communication for smartphones
Read2 me a cloud based reading aid for the visually impaired
Privacy preserving location sharing services for social networks
Pass byo bring your own picture for securing graphical passwords
Eplq efficient privacy preserving location-based query over outsourced encryp...
Analyzing ad library updates in android apps
An exploration of geographic authentication scheme

Recently uploaded (20)

PDF
Yogi Goddess Pres Conference Studio Updates
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
RMMM.pdf make it easy to upload and study
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
master seminar digital applications in india
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Trump Administration's workforce development strategy
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Lesson notes of climatology university.
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Cell Types and Its function , kingdom of life
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Yogi Goddess Pres Conference Studio Updates
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
RMMM.pdf make it easy to upload and study
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
master seminar digital applications in india
FourierSeries-QuestionsWithAnswers(Part-A).pdf
01-Introduction-to-Information-Management.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Trump Administration's workforce development strategy
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Final Presentation General Medicine 03-08-2024.pptx
Pharma ospi slides which help in ospi learning
Lesson notes of climatology university.
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Cell Types and Its function , kingdom of life
Final Presentation General Medicine 03-08-2024.pptx
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE

Privacy preserving and truthful detection of packet dropping attacks in wireless ad hoc networks

  • 1. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 1Page number 1 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks Abstract Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. To improve the detection accuracy, we propose to exploit the correlations between lost packets. Furthermore, to ensure truthful calculation of these correlations, we develop a homomorphic linear authenticator (HLA) based public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This construction is privacy preserving, collusion
  • 2. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 2Page number 2 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com proof, and incurs low communication and storage overheads. To reduce the computation overhead of the baseline scheme, a packet-block-based mechanism is also proposed, which allows one to trade detection accuracy for lower computation complexity. Through extensive simulations, we verify that the proposed mechanisms achieve significantly better detection accuracy than conventional methods such as a maximum-likelihood based detection. EXISTING SYSTEM In existing system, Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. Conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy DRAWBACK OF EXISTING SYSTEM  Privacy preserving, collusion proof, and incurs low communication and storage overheads.  Sequence of packet losses PROPOSED SYSTEM To improve the detection accuracy, we propose to exploit the correlations between lost packets and to ensure truthful calculation of these correlations, we develop a homomorphic linear authenticator
  • 3. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 3Page number 3 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com (HLA) based public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes. To reduce the computation overhead of the baseline scheme, a packet- block-based mechanism is also proposed, which allows one to trade detection accuracy for lower computation complexity. Through extensive simulations, we verify that the proposed mechanisms achieve significantly better detection accuracy than conventional methods such as a maximum-likelihood based detection. ADVANTAGE OF PROPOSED SYSTEM  Easy to be detected the pocket loss  Easy to detect and mitigate.  Threats completely eliminated from network routing table. SYSTEM SPECIFICATION Hardware Requirements System : Pentium IV 2.4 GHz Hard Disk : 40 GB Floppy Drive : 1.44 Mb Monitor : 15 VGA Colour Mouse : Logitech
  • 4. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 4Page number 4 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Ram : 512 Mb Software Requirements Operating system : Windows Family Tools : eclipse/Netbeans Technology Used : Java Backend Used : SQL Server