Downloads: 113 | Views: 297
Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017 | Popularity: 6.2 / 10
Detection of Packet Dropping Attacks in Wireless Ad-Hoc Network Based On Privacy Preserving Public Auditing
Kirti B. Mane, N. J. Pathan
Abstract: In multi-hop wireless ad-hoc network packet loss can be caused by mainly because of two different reasons. Link error and malicious packet dropping are two different reasons because of which packet loss can be take place. While discovering continuous packet loss in the network. It is hard to find out whether the loss is due to link error or by malicious packet drop. In this paper we can mainly concentrate on insider attack case that is malicious packet dropping where malicious nodes that are part of the route that will drop a small amount of packet which will affect the network performance. Based on traditional algorithm when we compare the packet dropping rate and the channel error rate, the packet dropping rate does not achieve the satisfactory detection accuracy. To improve the detection accuracy, the correlation between lost packets is identified by using the bitmap obtained from individual node. In this paper a homomorphic linear authenticator which is based on public auditing architecture is applied, which allows the detector to find the truthful information about packet loss. The proposed technique is privacy preserving, collusion proof and causes low communication and storage overheads at intermediate nodes. The auditor will collect the information reported by individual nodes and will determine the reason for packet loss by determining correlation between packet loss. Once the malicious node is identified then it is eliminated from route.
Keywords: packet dropping, secure routing, attack detection, auditing, correlation, Link error
Edition: Volume 6 Issue 4, April 2017
Pages: 2328 - 2331
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 4, April 2024
Pages: 285 - 288Anomaly Detection of Financial Data using Machine Learning
Khirod Chandra Panda
Downloads: 85
Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1251 - 1256IT Auditing and its Standards
Dr D S Kushwaha, Ankur Singh
Downloads: 99
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2242 - 2246Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Downloads: 100
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Downloads: 100
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe