Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Privacy-Preserving and Truthful Detection of Packet Dropping

No description
by

Bhanu prakash

on 2 February 2016

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Privacy-Preserving and Truthful Detection of Packet Dropping

contents
Second attaker starts dropping packets.
In the most severe problem, the malicious node simply stops forwarding every packet received from upstream nodes, completely disrupting the path between the source and the destination.
such a severe Denial-of-Service (DoS)attack can paralyze the network by partitioning its topology .
Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless
ad hoc network.

Our proposed approach determines whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop.

we use a
H
ormomorphic linear Authenticaton(HLA)
based public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes.

Privacy-preserving and truthful detection of packet Dropping Attacks in wireless Ad Hos Networks

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

Department of Computer Science and Engineering

S V COLLEGE OF ENGINEERING

(Affiliated to Jawaharlal Nehru Technological University)

(2013-2015)

Under the Guidance of


Guru Joshna M.tech
Asst.prof

Submitted by

T. Bhanu Prakash
13BF1D0516

A Project Report on

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks


MASTER OF TECHNOLOGY
IN

Computer Science



Abstract
Existing System
Proposed System
Advantages
Disadvantages
System Requirements
ABSTRACT:
In multi-hop wireless network, nodes cooperate in relaying/routing traffic.
An attacker takes chance in this cooperative nature to launch attacks.
For example, the attacker may first pretend to be a cooperative node in the route discovery process.

Existing System

In Existing The difficulty comes from the requirement that we need to not only detect the place (or hop) where the packet is dropped, but also identify whether the drop is intentional or unintentional.
Specifically, due to the open nature of wireless medium ,a packet drop in the network could be caused by harsh channel conditions (e.g., fading, noise, and interference,link errors), or by the insider attacker.
Proposed System

Proposed system guarantee that the packet-loss
causes reported by individual nodes along
the route are truthful.

i.e., reflect the actual status of each packet transmission.
Here we use auditing mechanism is needed to verify
the truthfulness of the reported information.

privacy-preserving the public auditor should not
be able to see the content of a packet delivered on
the route through the auditing information
submitted by individual hops



also low communication and storage
overheads at intermediate nodes.
This makes our mechanism applicable to a wide range of wireless devices, incuding low-cost wireless sensors that have very limited bandwidth and memory capacities.


Advantages
Disadvantages
The insider attacker can use the problems
by using channel conditions.
Not enough to accurately identify the exact cause of a packet loss.
The number of maliciously-dropped packets to be significantly higher than link errors.


The insider attacker can use the problems by
using channel conditions.
Not enough to accurately identify the exact cause of a packet loss.
The number of maliciously-dropped packets
to be significantly higher than link errors.

System Requirements
Software Requirements
Operating System : Windows XP
Language : Advancedjava

Hardware Requirements
Processor : Pentium IV
Hard Disk : 40GB
RAM : 2GB or more


Thanking you
Any
Quries
???
Modules:

Module :Key generation

This module will target to implement the algorithm for generation of three types of security in network
These keys are :
unique secret key: This key is shared between node and sink.
Cell Key:  This key is shared between node in same cell.
Set Of Authentication Keys: This key is used for cell to cell aurthentication.
Module 3:Key distribution

This module will describe the process key distribution in wireless sensor network using the robot mechanism.

The robot will visit each cell of sensor node and distribute the three kinds of key to each cell.

Module :Path selection

This module will show the phase of path selection between source and destination nodes for data sending process.

Path selection will be done on the assumption that source and destination know the location of each other.
 

Module :Design Of IGE

  In this module we develop a user interface to construct the requirement network model of user choice which also provides a privilege to set properties to the desired components.

In this module we will create virtual grid architecture.

Placing wireless sensor nodes into grid.

Selection of cluster head.
5 Module :data sending process

• This module is responsible for showing the run time scenario of data sending between source and destination pair and the behavior of intermediate nodes using three type of key.
• In this module we show the data encryption done by various keys.

6 Module :data Filtering

• This module will show data filtering process.
• cluster head will verify each data send by node in same cell.
• look for the ID of each node of that cell.
• If some Id is missing then it drop data.

Thank u.....!
Full transcript