An efficient unobservable routing scheme resistant against DoS attacks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 10
Abstract
Privacy protection for ad hoc networks with low-power wireless devices and lowbandwidth network connection is a very challenging task. A number of anonymous routing schemes have been proposed for ad hoc networks to provide better support for privacy protection but bring significant computation overhead. The existing system introduces efficient privacypreserving routing protocol USOR that achieves content unobservability by employing anonymous key establishment based on group signature in which each node obtain a group signature signing key and an ID-based private key from an offline key server or by a key management scheme. The unobservable routing protocol is then executed in two phases such as anonymous key establishment process and unobservable route discovery process in order to construct secret session keys as well as finding route to the destination. The USOR scheme is protect packet’s content independent of traffic pattern unobservability which can be used with appropriate traffic padding schemes to achieve truly communication unobservability. Although it performs well wormhole attacks cannot be prevented in USOR mechanism. The proposed system aimed at developing unobservable routing scheme resistant against DoS attacks such as Gray hole/Black hole attacks to protect network-layer reactive protocols. It discovers malicious nodes during route discovery process when they mitigate fabricated routing information to attract the source node to send data through malformed packet. Security analysis demonstrates that USOR can well protect userprivacy against internal and external attackersand simulation results show that it achieves stronger privacy protection than existing schemes.
Authors and Affiliations
Chithra K , Dr. S. Karthik
A Dynamic Approach to Optimize Energy in RIP, OLSR and Fisheye Routing Protocols using Simulator
Energy optimization is an essential issue in wireless sensor network that consumes less energy to give optimum performance under low battery power, limited bandwidth and network life time of each node. In this paper, fir...
Comparison of Band-stop FIR Filter using Modified Hamming Window and Other Window functions and Its Application in Filtering a Mutitone Signal
In this paper Matlab program is used to implement a Band-stop FIR filter using modified coefficient of the Hamming window function and its application in filtering a Multitone input signal. FIR filter designed usin...
Application of Genetic Algorithm for Image Enhancement and Segmentation.
Genetic algorithm is the type of Soft Computing method. The Genetic Algorithm (GA) is a model of machine learning which derives its behavior from a metaphor of the processes of evolution in nature. The aim is to en...
Eye Detection System using Orientation Histogram
Face alignment is an important issue in face recognition systems. The performance of the face recognition system depends on the accuracy of face alignment. Since face alignment is usually conducted using eye positi...
AUTOMATIC IMAGE ANNOTATION USING WEAKLY SUPERVISED GRAPH PROPAGATION
Weakly supervised graph propagation is a method to automatically assign the annotated labels to semantically derived a semantic region. Inputs given are, the training images directory, the labels which are pre-ass...