International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-10,Issue-8  ( Aug, 2022 )
Past issues
  1. Volume-10,Issue-7  ( Jul, 2022 )
  2. Volume-10,Issue-6  ( Jun, 2022 )
  3. Volume-10,Issue-5  ( May, 2022 )
  4. Volume-10,Issue-4  ( Apr, 2022 )
  5. Volume-10,Issue-3  ( Mar, 2022 )
  6. Volume-10,Issue-2  ( Feb, 2022 )
  7. Volume-10,Issue-1  ( Jan, 2022 )
  8. Volume-9,Issue-12  ( Dec, 2021 )
  9. Volume-9,Issue-11  ( Nov, 2021 )
  10. Volume-9,Issue-10  ( Oct, 2021 )

Statistics report
Dec. 2022
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 116
Paper Published : 1401
No. of Authors : 3560
  Journal Paper


Paper Title :
Detecting Packet Dropping Attacks And Preserving Privacy Path Using Optimal Link State Routing In WANETS

Author :A.Vinodhini, G.Prabaharan

Article Citation :A.Vinodhini ,G.Prabaharan , (2016 ) " Detecting Packet Dropping Attacks And Preserving Privacy Path Using Optimal Link State Routing In WANETS " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 118-122, Volume-4, Issue-6

Abstract : In multi-hop wireless ad hoc network link error and malicious packet dropping are two sources for packet losses. Whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop are to be identified, can be known by observing a sequence of packet losses in the network. But in the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy because the packet dropping rate in this case is comparable to the channel error rate. Hence to improve the detection accuracy, the correlations between lost packets is identified. The technique called Homomorphism linear authenticator (HLA) based public auditing architecture is developed that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This technique provides privacy preserving, collusion proof, and incurs low communication and storage overheads. A packet-block based mechanism is also proposed, to reduce the computation overhead of the baseline scheme, which allows one to trade detection accuracy for lower computation complexity. Keywords—Packet Dropping, Secure Routing, Attack Detection, Homomorphic Linear Signature, Auditing.

Type : Research paper

Published : Volume-4, Issue-6


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-4778   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 63
| Published on 2016-07-08
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY