A Packet Loss.docx

  • Uploaded by: Harikrishnan Shunmugam
  • 0
  • 0
  • July 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View A Packet Loss.docx as PDF for free.

More details

  • Words: 612
  • Pages: 3
Collision Detection for dusty packet in Mobile Adhoc Network Abstract Most existing trust-based security schemes for MANETs consider packet loss an indicator of possible attacks by malicious nodes. There may be several reasons for packet losses, such as interference, queue overflow, and node mobility.Identifying the real underlying cause of a packet loss event is important for any security solution. To detect truly malicious nodes, it is necessary to carry out a fine-grained analysis to determine the underlying cause of such loss. Without such analysis,the performance of any security solution may degrade, due to the punishment of innocent nodes while actual malicious nodes may remain undetected. Therefore, approaches are required that can correctly identify the reason of packet losses and can react accordingly. It present a scheme able to correctly identify malicious nodes, using network parameters to determine whether packet losses are due to queue overflows or node mobility in MANETs. The contributions of this paper include a fine-grained analysis (FGA) scheme for packet loss and the development of a comprehensive trust model for malicious node identification and isolation. Our proposed FGA scheme is evaluated in terms of effectiveness

and

performance

metric

sunder

different

network

parameters

and

configurations. The experimental results show that our proposed trust model achieves a significant reduction in false positives rate and an increase in the rate of detection of truly malicious nodes as compared to traditional non-FGA schemes. EXISTING SYSTEM: 

lightweight packet drop detection for ad-hoc networks (LiPaD). They suggested that every node must keep a count of received/forwarded packets and periodically report to a coordinator node for analysis and malicious node detection. Such technique requires a computationally powerful, central coordinator node that is practically not feasible in MANETs.



Another system which is collaborative reputation-based solution, called CORE, was proposed by Michiardi et al. to evaluate the reputation of a node. They suggested that collaborative reputation is the combination of subjective, indirect, and functional reputations. A reputation table is maintained at each node to record the reputation of other nodes and to determine whether a node is malicious or not.

DISADVANTAGES OF EXISTING SYSTEM: 

Considered eachpacket loss as misbehavior by malicious nodes, without analyzing the other possible causes of packet losses.



High false positive rate.



Consume more energy.

PROPOSED SYSTEM: 

We propose a fine-grained analysis (FGA) scheme that investigates the causes of data packet losses and reports the most likely cause of these losses. We first identify the key parameters for analyzing the cause of packet losses under different aspects.



Our FGA scheme uses several different parameters such as MAC layer information, queue information, and rate of link changes to profile the links between nodes as well as the nodes’ neighborhoods. The reason for using local information at each node is to achieve more accurate information and view of network.



Although global information may in some cases provide sufficient information, it is possible that false information provided by the misbehaving node can circumvent the security mechanisms. Moreover, as the FGA scheme requires information about the node neighborhood, each node uses its own local information to take a more informed decision.

ADVANTAGES OF PROPOSED SYSTEM: 

High and accurate detection rate.



Low false positive rate.



Consider and analyze cause of packet loss.

SYSTEM ARCHITECTURE SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: 

System : Pentium Dual Core.



Hard Disk : 120 GB.



Monitor : 15’’LED



Input Devices : Keyboard, Mouse



Ram :

SOFTWARE REQUIREMENTS: 

Operating system : Windows XP/UBUNTU.



Implementation : NS2



NS2 Version : 2.28



Front End : OTCL (Object Oriented Tool Command Language)



Tool : Cygwin (To simulate in Windows OS)

Related Documents

A Packet Loss.docx
July 2020 2
Packet-ss7
June 2020 5
Basic Packet
May 2020 6
Membership Packet
June 2020 6
Rph Packet
June 2020 8

More Documents from ""

Iot.docx
April 2020 2
A Packet Loss.docx
July 2020 2
May 2020 5
November 2019 1
Master 2 Lite.pdf
November 2019 3