Skip to main content


To Demonstrate that Proposed Ip Trace back Method Through DPM

Issue Abstract

Abstracts
Link error and malicious packet dropping are two sources for packet losses in multi hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop.
We are especially interested in the insider attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection
accuracy. To improve the detection accuracy, we propose to exploit the correlations between lost packets.
Furthermore, to ensure truthful calculation of these correlations, we develop a homomorphic linear authenticator (HLA) based public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This construction is privacy preserving, collusion proof, and incurs low communication and storage overheads. To reduce the computation overhead of the baseline scheme, a packetblock-based mechanism is also proposed, which allows one to trade detection accuracy for lower computation complexity. Through extensive simulations, we verify that the proposed mechanisms achieve significantly better detection accuracy than conventional methods such as a maximum-likelihood based detection.
Keywords: HDM; Multi-hop Wireless adhoc Network; Conventional Algorithms; Cybersecurity; IP traceback; Scalability ;
 


Author Information
S.SOWMIYA,
Issue No
2
Volume No
3
Issue Publish Date
05 Feb 2017
Issue Pages
62-68

Issue References

References

  1.  K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, ―An acknowledgement- based approach for the detection of routing misbehavior in MANETs,‖ IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536– 550, May 2006. 

  2. Y. Liu and Y. R. Yang, ―Reputation propagation and agreement in mobile adhoc networks,‖ in Proc. IEEE WCNC Conf., 2003, pp. 1510–1515. 

  3. S. Marti, T. J. Giuli, K. Lai, and M. Baker, ―Mitigating routing misbehavior in mobile ad hoc networks,‖ in Proc. ACM MobiCom Conf., 2000, pp. 255–265. 

  4. G. Noubir and G. Lin, ―Low-power DoS attacks in data wireless lans and countermeasures,‖ ACM SIGMOBILE Mobile Comput. Commun. Rev., vol. 7, no. 3, pp. 29–30, Jul. 2003. 

  5. V. N. Padmanabhan and D. R. Simon, ―Secure traceroute to detect faulty or malicious routing,‖ in Proc. ACM SIGCOMM Conf., 2003, pp. 77–82. 

  6. P. Papadimitratos and Z. Haas, ―Secure message transmission in mobile ad hoc networks,‖ Ad Hoc Netw., vol. 1, no. 1, pp. 193–209, 2003.  A. Proano and L. Lazos, ―Selective jamming attacks in wireless networks,‖ in Proc.
    IEEE ICC Conf., 2010, pp. 1–6.

  7.  A. Proano and L. Lazos, ―Packet-hiding methods for preventing selective jamming attacks,‖ IEEE Trans. Depend. 1, pp. 101– 114, Jan./Feb.2012.