SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET
DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS
ABSTRACT
Link error and malicious packet dropping are two sources for packet losses in multi-hop
wireless ad hoc network. While observing a sequence of packet losses in the network, whether
the losses are caused by link errors only, or by the combined effect of link errors and malicious
drop are to be identified. In the insider-attack case, whereby malicious nodes that are part of the
route xploit their knowledge of the communication context to selectively drop a small amount of
packets critical to the network performance. Because the packet dropping rate in this case is
comparable to the channel error rate, conventional algorithms that are based on detecting the
packet loss rate cannot achieve satisfactory detection accuracy. To improve the detection
accuracy, the correlations between lost packets is identified. Homomorphism linear authenticator
(HLA) based public auditing architecture is developed that allows the detector to verify the
truthfulness of the packet loss information reported by nodes. This construction is privacy
preserving, collusion proof, and incurs low communication and storage overheads. To reduce the
computation overhead of the baseline scheme, a packet-block based mechanism is also proposed,
which allows one to trade detection accuracy for lower computation complexity.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
INTRODUCTION
In a multi-hop wireless network, nodes cooperate in relaying/ routing traffic. An
adversary can exploit this cooperative nature to launch attacks. For example, the adversary may
first pretend to be a cooperative node in the route discovery process. Once being included in a
route, the adversary starts dropping packets. In the most severe form, the malicious node simply
stops forwarding every packet received from upstream nodes, completely disrupting the path
between the source and the destination. Eventually, such a severe Denial-of-Service (DoS) attack
can paralyze the network by partitioning its topology. Even though persistent packet dropping
can effectively degrade the performance of the network, from the attacker’s standpoint such an
“always-on” attack has its disadvantages.
PROBLEM DEFINITION
Detecting selective packet-dropping attacks is extremely challenging in a highly dynamic
wireless environment. The difficulty comes from the requirement that we need to not only detect
the place (or hop) where the packet is dropped, but also identify whether the drop is intentional
or unintentional. Specifically, due to the open nature of wireless medium, a packet drop in the
network could be caused by harsh channel conditions e.g., fading, noise, and interference, link
errors, or by the insider attacker. In an open wireless environment, link errors are quite
significant, and may not be significantly smaller than the packet dropping rate of the insider
attacker. So, the insider attacker can camouflage under the background of harsh channel
conditions. In this case, just by observing the packet loss rate is not enough to accurately identify
the exact cause of a packet loss.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
EXISTING SYSTEM
The related work can be classified into the following two categories.
_ High malicious dropping rates The first category aims at high malicious dropping rates,
where most (or all) lost packets are caused by malicious dropping. In this case, the impact of link
errors is ignored. Most related work falls into this category. Based on the methodology used to
identify the attacking nodes, these works can be further classified into four subcategories.
 Credit systems
A credit system provides an incentive for cooperation. A node receives credit by relaying packets
for others, and uses its credit to send its own packets. As a result, a maliciously node that
continuous to drop packets will eventually deplete its credit, and will not be able to send its own
traffic.
 Reputation systems
A reputation system relies on neighbors to monitor and identify misbehaving nodes. A node with
a high packet dropping rate is given a bad reputation by its neighbors. This reputation
information is propagated periodically throughout the network and is used as an important metric
in selecting routes. Consequently, a malicious node will be excluded from any route.
 End-to end or hop-to-hop acknowledgements
To directly locate the hops where packets are lost. A hop of high packet loss rate will be
excluded from the route.
 Cryptographic methods
Bloom filters used to construct proofs for the forwarding of packets at each node. By examining
the relayed packets at successive hops along a route, one can identify suspicious hops that exhibit
high packet loss rates.
_ Number of maliciously dropped packets is significantly higher than that caused by link
errors
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
The second category targets the scenario where the number of maliciously dropped packets is
significantly higher than that caused by link errors, but the impact of link errors is non-
negligible.
Disadvantages
_ Most of the related works assumes that malicious dropping is the only source of packet loss.
_ For the credit-system-based method, a malicious node may still receive enough credits by
forwarding most of the packets it receives from upstream nodes.
_ In the reputation-based approach, the malicious node can maintain a reasonably good
reputation by forwarding most of the packets to the next hop.
_ While the Bloom-filter scheme is able to provide a packet forwarding proof, the correctness of
the proof is probabilistic and it may contain errors.
_ As for the acknowledgement-based method and all the mechanisms in the second category,
merely counting the number of lost packets does not give a sufficient ground to detect the real
culprit that is causing packet losses.
PROPOSED SYSTEM
_ To develop an accurate algorithm for detecting selective packet drops made by insider
attackers.
_ This algorithm also provides a truthful and publicly verifiable decision statistics as a proof to
support the detection decision.
_ The high detection accuracy is achieved by exploiting the correlations between the positions of
lost packets, as calculated from the auto-correlation function (ACF) of the packet-loss bitmap–a
bitmap describing the lost/received status of each packet in a sequence of consecutive packet
transmissions.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
_ By detecting the correlations between lost packets, one can decide whether the packet loss is
purely due to regular link errors, or is a combined effect of link error and malicious drop.
_ The main challenge in our mechanism lies in how to guarantee that the packet-loss bitmaps
reported by individual nodes along the route are truthful, i.e., reflect the actual status of each
packet transmission.
_ Such truthfulness is essential for correct calculation of the correlation between lost packets,
this can be achieved by some auditing.
_ Considering that a typical wireless device is resource-constrained, we also require that a user
should be able to delegate the burden of auditing and detection to some public server to save its
own resources.
_ Public-auditing problem is constructed based on the homomorphism linear authenticator
(HLA) cryptographic primitive, which is basically a signature scheme widely used in cloud
computing and storage server systems to provide a proof of storage from the server to entrusting
clients.
Advantages
_ High detection accuracy
_ Privacy-preserving: the public auditor should not be able to decern the content of a packet
delivered on the route through the auditing information submitted by individual hops
_ incurs low communication and storage overheads at intermediate nodes
HARDWARE REQUIREMENTS
Processor : Any Processor above 500 MHz
Ram : 128Mb.
Hard Disk : 10 GB.
Compact Disk : 650 MB
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.
SOFTWARE SPECIFICATION
Operating System : Windows Family.
Programming Language : JDK 1.5 or higher
Database : MySQL 5.0

More Related Content

PDF
Privacy preserving and truthful detection of packet dropping attacks in wirel...
DOCX
Privacy preserving and truthful detection of packet dropping attacks in wirel...
DOCX
Passive ip traceback
DOCX
Passive ip traceback disclosing the locations of ip spoofers from path backsc
DOCX
Random walk based approach to detect clone attacks in wireless sensor networks
PDF
Cookie surveillance
DOCX
Privacy preserving and truthful detection of packet dropping attacks in wirel...
DOCX
A lightweight secure scheme for detecting
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Passive ip traceback
Passive ip traceback disclosing the locations of ip spoofers from path backsc
Random walk based approach to detect clone attacks in wireless sensor networks
Cookie surveillance
Privacy preserving and truthful detection of packet dropping attacks in wirel...
A lightweight secure scheme for detecting

Similar to Privacy preserving and truthful detection of packet (20)

PPTX
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
PDF
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
PDF
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
PDF
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
PDF
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
PDF
Privacy preserving and truthful detection of packet dropping attacks in wirel...
DOCX
Privacy preserving and truthful detection
DOCX
Privacy preserving and truthful detection
PDF
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
PDF
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
PDF
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
PDF
B010110514
PDF
Survey on Different Packet Drop Detection Techniques in Mobile AdHoc Network
PDF
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
DOCX
Privacy preserving and truthful detection of packet dropping attacks in wirel...
DOCX
Secure and distributed data discovery and dissemination in wireless sensor ne...
PPTX
Papers We Love Sept. 2018: 007: Democratically Finding The Cause of Packet Drops
PDF
Analyze and Detect Packet Loss for Data Transmission in WSN
PDF
Placate packet dropping attack using secure routing protocol and incentive ba...
DOCX
Catching packet droppers and modifiers
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection
Privacy preserving and truthful detection
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
B010110514
Survey on Different Packet Drop Detection Techniques in Mobile AdHoc Network
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Secure and distributed data discovery and dissemination in wireless sensor ne...
Papers We Love Sept. 2018: 007: Democratically Finding The Cause of Packet Drops
Analyze and Detect Packet Loss for Data Transmission in WSN
Placate packet dropping attack using secure routing protocol and incentive ba...
Catching packet droppers and modifiers
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ad

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
1. Introduction to Computer Programming.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Digital-Transformation-Roadmap-for-Companies.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25-Week II
1. Introduction to Computer Programming.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Group 1 Presentation -Planning and Decision Making .pptx
Electronic commerce courselecture one. Pdf
Programs and apps: productivity, graphics, security and other tools
A comparative analysis of optical character recognition models for extracting...
Encapsulation_ Review paper, used for researhc scholars
MIND Revenue Release Quarter 2 2025 Press Release
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
SOPHOS-XG Firewall Administrator PPT.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Privacy preserving and truthful detection of packet

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS ABSTRACT Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. While observing a sequence of packet losses in the network, whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop are to be identified. In the insider-attack case, whereby malicious nodes that are part of the route xploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. To improve the detection accuracy, the correlations between lost packets is identified. Homomorphism linear authenticator (HLA) based public auditing architecture is developed that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This construction is privacy preserving, collusion proof, and incurs low communication and storage overheads. To reduce the computation overhead of the baseline scheme, a packet-block based mechanism is also proposed, which allows one to trade detection accuracy for lower computation complexity.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com INTRODUCTION In a multi-hop wireless network, nodes cooperate in relaying/ routing traffic. An adversary can exploit this cooperative nature to launch attacks. For example, the adversary may first pretend to be a cooperative node in the route discovery process. Once being included in a route, the adversary starts dropping packets. In the most severe form, the malicious node simply stops forwarding every packet received from upstream nodes, completely disrupting the path between the source and the destination. Eventually, such a severe Denial-of-Service (DoS) attack can paralyze the network by partitioning its topology. Even though persistent packet dropping can effectively degrade the performance of the network, from the attacker’s standpoint such an “always-on” attack has its disadvantages. PROBLEM DEFINITION Detecting selective packet-dropping attacks is extremely challenging in a highly dynamic wireless environment. The difficulty comes from the requirement that we need to not only detect the place (or hop) where the packet is dropped, but also identify whether the drop is intentional or unintentional. Specifically, due to the open nature of wireless medium, a packet drop in the network could be caused by harsh channel conditions e.g., fading, noise, and interference, link errors, or by the insider attacker. In an open wireless environment, link errors are quite significant, and may not be significantly smaller than the packet dropping rate of the insider attacker. So, the insider attacker can camouflage under the background of harsh channel conditions. In this case, just by observing the packet loss rate is not enough to accurately identify the exact cause of a packet loss.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com EXISTING SYSTEM The related work can be classified into the following two categories. _ High malicious dropping rates The first category aims at high malicious dropping rates, where most (or all) lost packets are caused by malicious dropping. In this case, the impact of link errors is ignored. Most related work falls into this category. Based on the methodology used to identify the attacking nodes, these works can be further classified into four subcategories.  Credit systems A credit system provides an incentive for cooperation. A node receives credit by relaying packets for others, and uses its credit to send its own packets. As a result, a maliciously node that continuous to drop packets will eventually deplete its credit, and will not be able to send its own traffic.  Reputation systems A reputation system relies on neighbors to monitor and identify misbehaving nodes. A node with a high packet dropping rate is given a bad reputation by its neighbors. This reputation information is propagated periodically throughout the network and is used as an important metric in selecting routes. Consequently, a malicious node will be excluded from any route.  End-to end or hop-to-hop acknowledgements To directly locate the hops where packets are lost. A hop of high packet loss rate will be excluded from the route.  Cryptographic methods Bloom filters used to construct proofs for the forwarding of packets at each node. By examining the relayed packets at successive hops along a route, one can identify suspicious hops that exhibit high packet loss rates. _ Number of maliciously dropped packets is significantly higher than that caused by link errors
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com The second category targets the scenario where the number of maliciously dropped packets is significantly higher than that caused by link errors, but the impact of link errors is non- negligible. Disadvantages _ Most of the related works assumes that malicious dropping is the only source of packet loss. _ For the credit-system-based method, a malicious node may still receive enough credits by forwarding most of the packets it receives from upstream nodes. _ In the reputation-based approach, the malicious node can maintain a reasonably good reputation by forwarding most of the packets to the next hop. _ While the Bloom-filter scheme is able to provide a packet forwarding proof, the correctness of the proof is probabilistic and it may contain errors. _ As for the acknowledgement-based method and all the mechanisms in the second category, merely counting the number of lost packets does not give a sufficient ground to detect the real culprit that is causing packet losses. PROPOSED SYSTEM _ To develop an accurate algorithm for detecting selective packet drops made by insider attackers. _ This algorithm also provides a truthful and publicly verifiable decision statistics as a proof to support the detection decision. _ The high detection accuracy is achieved by exploiting the correlations between the positions of lost packets, as calculated from the auto-correlation function (ACF) of the packet-loss bitmap–a bitmap describing the lost/received status of each packet in a sequence of consecutive packet transmissions.
  • 5. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com _ By detecting the correlations between lost packets, one can decide whether the packet loss is purely due to regular link errors, or is a combined effect of link error and malicious drop. _ The main challenge in our mechanism lies in how to guarantee that the packet-loss bitmaps reported by individual nodes along the route are truthful, i.e., reflect the actual status of each packet transmission. _ Such truthfulness is essential for correct calculation of the correlation between lost packets, this can be achieved by some auditing. _ Considering that a typical wireless device is resource-constrained, we also require that a user should be able to delegate the burden of auditing and detection to some public server to save its own resources. _ Public-auditing problem is constructed based on the homomorphism linear authenticator (HLA) cryptographic primitive, which is basically a signature scheme widely used in cloud computing and storage server systems to provide a proof of storage from the server to entrusting clients. Advantages _ High detection accuracy _ Privacy-preserving: the public auditor should not be able to decern the content of a packet delivered on the route through the auditing information submitted by individual hops _ incurs low communication and storage overheads at intermediate nodes HARDWARE REQUIREMENTS Processor : Any Processor above 500 MHz Ram : 128Mb. Hard Disk : 10 GB. Compact Disk : 650 MB
  • 6. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor. SOFTWARE SPECIFICATION Operating System : Windows Family. Programming Language : JDK 1.5 or higher Database : MySQL 5.0