Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Detection of Malicious Packet Dropping Attacks in Wireless Ad Hoc Networks Using Enhanced HLA Scheme

Author : Kasa Hima Bindu 1 S.Vasundra 2

Date of Publication :7th October 2016

Abstract: In ad hoc networks and multi-hop wireless networks, packet dropping because of malicious nodes is the major cause of packet loss. To determine whether the losses are caused at the intermediate nodes or at the source and destination itself, a scheme has to be adopted where every node should be checked properly. By using packet loss patterns and with the help of proposed algorithm, the packet dropping nodes can be truthfully detected in a wireless ad hoc environment. The existing system adopted an algorithm which finds packet drops made by insider that are important to the network. Even though the packet drops may be caused by malicious dropping as well as by normal channel losses, the phenomenon which is exhibited has two different correlation structures. The correlations in between the lost packets positions are calculated to find out the detection accuracy. A homomorphism linear authenticator based public auditing architecture allows the auditor to check the correctness of the information given by the packets. A packet block based algorithm is also adopted to achieve the detection accuracy for the sensors with lower computational complexities. Though the system is collusion proof and gives overheads that are large, it is limited to static wireless ad hoc networks. The drawback is that the existing system assumed that source and destination are not malicious in following the protocol. The proposed system modifies the algorithms used in the existing system and detects the malicious routing attacks in ad hoc network. High detection accuracy is achieved by using enhanced HLA scheme where signatures are generated for each node in the route. The advantage of the proposed system is that even the misbehaving source and destination will also be considered in the new system.

Reference :

Will Updated soon

Recent Article