International Journal of Advance Computational Engineering and Networking (IJACEN)
.
current issues
Volume-8,Issue-4  ( Apr, 2020 )
Past issues
  1. Volume-8,Issue-3  ( Mar, 2020 )
  2. Volume-8,Issue-2  ( Feb, 2020 )
  3. Volume-8,Issue-1  ( Jan, 2020 )
  4. Volume-7,Issue-12  ( Dec, 2019 )
  5. Volume-7,Issue-11  ( Nov, 2019 )
  6. Volume-7, Issue-10  ( Oct, 2019 )
  7. Volume-7, Issue-9  ( Sep, 2019 )
  8. Volume-7, Issue-8  ( Aug, 2019 )
  9. Volume-7, Issue-7  ( Jul, 2019 )
  10. Volume-7, Issue-6  ( Jun, 2019 )

Statistics report
Aug. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 87
Paper Published : 1231
No. of Authors : 3095
  Journal Paper

Paper Title
Detecting Packet Dropping Attacks And Preserving Privacy Path Using Optimal Link State Routing In WANETS

Abstract
In multi-hop wireless ad hoc network link error and malicious packet dropping are two sources for packet losses. Whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop are to be identified, can be known by observing a sequence of packet losses in the network. But in the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy because the packet dropping rate in this case is comparable to the channel error rate. Hence to improve the detection accuracy, the correlations between lost packets is identified. The technique called Homomorphism linear authenticator (HLA) based public auditing architecture is developed that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This technique provides privacy preserving, collusion proof, and incurs low communication and storage overheads. A packet-block based mechanism is also proposed, to reduce the computation overhead of the baseline scheme, which allows one to trade detection accuracy for lower computation complexity. Keywords—Packet Dropping, Secure Routing, Attack Detection, Homomorphic Linear Signature, Auditing.


Author - A.Vinodhini, G.Prabaharan

| PDF |
Viewed - 61
| Published on 2016-07-08
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY