Open Access   Article Go Back

Attack Identification Based On Routing And Nonce Approach

R.Sathya 1 , A.Senthil Kumar2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-11 , Page no. 146-151, Nov-2015

Online published on Nov 30, 2015

Copyright © R.Sathya , A.Senthil Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R.Sathya , A.Senthil Kumar, “Attack Identification Based On Routing And Nonce Approach,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.146-151, 2015.

MLA Style Citation: R.Sathya , A.Senthil Kumar "Attack Identification Based On Routing And Nonce Approach." International Journal of Computer Sciences and Engineering 3.11 (2015): 146-151.

APA Style Citation: R.Sathya , A.Senthil Kumar, (2015). Attack Identification Based On Routing And Nonce Approach. International Journal of Computer Sciences and Engineering, 3(11), 146-151.

BibTex Style Citation:
@article{Kumar_2015,
author = {R.Sathya , A.Senthil Kumar},
title = {Attack Identification Based On Routing And Nonce Approach},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2015},
volume = {3},
Issue = {11},
month = {11},
year = {2015},
issn = {2347-2693},
pages = {146-151},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=752},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=752
TI - Attack Identification Based On Routing And Nonce Approach
T2 - International Journal of Computer Sciences and Engineering
AU - R.Sathya , A.Senthil Kumar
PY - 2015
DA - 2015/11/30
PB - IJCSE, Indore, INDIA
SP - 146-151
IS - 11
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2216 2172 downloads 2260 downloads
  
  
           

Abstract

Pernicious and selfish practices represent a genuine risk against steering in delay/disturbance tolerant frameworks (DTNs). Due to the exceptional framework characteristics, designing a misconduct location plan in DTN is regarded as a great challenge. In this paper, we propose iTrust, a probabilistic misconduct location scheme, for secure DTN steering toward effective trust establishment. The Fundamental idea of iTrust is introducing a periodically available Trusted Power (TA) to judge the node’s behavior based on the collected steering evidences and probabilistically checking. We model iTrust as the inspection diversion and use diversion theoretical investigation to illustrate that, by setting an appropriate investigation probability, TA could ensure the security of DTN steering at a decreased cost. To further improve the productivity of the proposed scheme, we correlate location likelihood with a node’s reputation, which allows a dynamic location likelihood decided by the trust of the users. The extensive investigation and reproduction results illustrate the effectiveness and productivity of the proposed scheme. . Indeed though the existing misconduct location plans work well for the customary remote networks, the exceptional framework qualities counting need of contemporaneous path, high variety in framework conditions, trouble to anticipate portability patterns, and long input delay have made the neighborhood observing based misconduct location plan unsatisfactory for DTNs. Selfish hub B gets the parcels from hub A but dispatches the bneed gap assault by refutilizing to forward the parcels to the next jump recipient C. Since there may be no neighboring hubs at the minute that B meets C, the misconduct (e.g., dropping messages) can’t be distinguished due to need of witness, which renders the monitoring-based misconduct location less.

Key-Words / Index Term

Framework Security, Delay Tolerant Networks, Protocols

References

[1] Mishra, A. ; Comput. Sci. & Eng., GGITM, Bhopal, India ; Jhapate, A.K. ; Kumar, P.” Improved Genetic Feedback Algorithm Based Network Security Policy Frame Work”, Published in: Future Networks, 2010. ICFN '10. Second International Conference on Date of Conference: 22-24 Jan. 2010 Page(s):8 – 10.
[2] Ganesh, S. ; Dept. of ECE, Sathyabama Univ., Chennai, India ; Sankar, S. ; Saravanakumar, S. ; Rex, S.L. ,” Three tier security frame work for Wireless Sensor Networks”, Published in: Advanced Nanomaterials and Emerging Engineering Technologies (ICANMEET), 2013 International Conference on Date of Conference: 24-26 July 2013 Page(s): 582 – 586.
[3] Volner, R. ; Dept. of Air Transp., Czech Tech. Univ., Prague, Czech Republic ; Lubomir, P.” Wireless biomedical home security network - architecture and modelling”, Published in: Security Technology, 2004. 38th Annual 2004 International Carnahan Conference on Date of Conference: 11-14 Oct. 2004 Page(s):69 – 76.
[4] Martin, C. ; Univ. of Ontario Inst. of Technol., Oshawa ; Refai, M.” A Policy-Based Metrics Framework for Information Security Performance Measurement”, Published in:Business-Driven IT Management, 2007. BDIM '07. 2nd IEEE/IFIP International Workshop on Date of Conference: 21-21 May 2007 Page(s): 94 – 101.
[5] Feltus, C. ; Public Res. Centre Henri Tudor, Luxembourg-Kirchberg, Luxembourg ; Ouedraogo, M. ; Khadraoui, D.” Towards cyber-security protection of critical infrastructures by generating security policy for SCADA systems”, Published in: Information and Communication Technologies for Disaster Management (ICT-DM), 2014 1st International Conference on Date of Conference: 24-25 March 2014 Page(s): 1 – 8.
[6] Soares, V.N.G.J. ; NetGNA Group, Inst. de Telecomun., Portugal ; Farahmand, F. ; Rodrigues, J.J.P.C.” Evaluating the Impact of Storage Capacity Constraints on Vehicular Delay-Tolerant Networks”, Published in: Communication Theory, Reliability, and Quality of Service, 2009. CTRQ '09. Second International Conference on Date of Conference: 20-25 July 2009 Page(s): 75 – 80.
[7] Jing Su ; Dept. of Comput. Sci., Toronto Univ., Ont. ; Goel, A. ; de Lara, E.” An Empirical Evaluation of the Student-Net Delay Tolerant Network” Published in: Mobile and Ubiquitous Systems: Networking & Services, 2006 Third Annual International Conference on Date of Conference: July 2006 Page(s): 1 – 10.
[8] Jing Su ; Dept. of Comput. Sci., Toronto Univ., Ont. ; Goel, A. ; de Lara, E.” An Empirical Evaluation of the Student-Net Delay Tolerant Network” Published in: Mobile and Ubiquitous Systems - Workshops, 2006. 3rd Annual International Conference on Date of Conference: 17-21 July 2006 Page(s): 1 – 10.
[9] Juanjuan Gu ; Sch. of Math. & Syst. Sci., Beihang Univ., Beijing, China ; Haiquan Wang ; Weijian Ma ; Dan Liu” Modeling and delay analysis for urban vehicular delay-tolerant networks” Published in: Communication Software and Networks (ICCSN), 2015 IEEE International Conference on Date of Conference: 6-7 June 2015 Page(s): 287 – 293.
[10] Uchida, N. ; Dept. of Informational Soc. Studies, Saitama Inst. of Technol., Fukaya, Japan ; Kawamura, N. ; Williams, N. ; Takahata, K.” Proposal of Delay Tolerant Network with Cognitive Wireless Network for Disaster Information Network System”, Published in: Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on Date of Conference: 25-28 March 2013 Page(s): 249 – 254.
[11] Zebo Feng ; Dept. of Inf. Security, Naval Univ. of Eng., Wuhan, China ; Xiaoping Wu ; Liangli Ma ; Wei Ren” Establishing the security foundations for network protocol design”, Published in: Communication Technology (ICCT), 2012 IEEE 14th International Conference on Date of Conference: 9-11 Nov. 2012 Page(s): 789 – 793.
[12] Bhatti, S. ; Sch. of Comput. Sci., Univ. of St. Andrews, St. Andrews, UK ; Brady, E. ; Hammond, K. ; McKinna, J.” Domain Specific Languages (DSLs) for Network Protocols (Position Paper)”, Published in: Distributed Computing Systems Workshops, 2009. ICDCS Workshops '09. 29th IEEE International Conference on Date of Conference: 22-26 June 2009 Page(s): 208 – 213.
[13] Bocking, S. ; Corp. Res. & Dev., Siemens AG, Munich, Germany” Object-oriented network protocols”, Published in: INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution., Proceedings IEEE (Volume:3) Date of Conference: 7-12 Apr 1997 Page(s): 1245 - 1252 vol.3.
[14] Pham, T. ; Dept of Comput. Sci., San Jose State Univ., CA, USA ; Eun Jik Kim ; Moh, M.” On data aggregation quality and energy efficiency of wireless sensor network protocols - extended summary”, Published in: Broadband Networks, 2004. BroadNets 2004. Proceedings. First International Conference on Date of Conference: 25-29 Oct. 2004 Page(s): 730 – 732.
[15] Green, C.J. ; Appl. Machine Intelligence, San Juan Capistrano, CA, USA,” Protocols for a self-healing network”, Published in: Military Communications Conference, 1995. MILCOM '95, Conference Record, IEEE (Volume:1 ) Date of Conference: 6 Nov 1995 Page(s): 252 - 256 vol.1.