G.Sridhar Reddy, V.N.Venu Gopal


We build up an effective algorithm for detection of selective packet drops made by insider attackers and it moreover provides a truthful as well as publicly verifiable decision statistics as a proof to maintain detection decision. In our work we are interested to find out whether the losses are due to link errors or else by the collective effect of malicious drop and link errors during the observation of the packet losses within the network. Identifying attacks of selective packet-dropping is particularly not easy in an extremely active wireless environment. The difficulty comes from prerequisite that we need to not only distinguish the place of packet dropping, but moreover to recognize whether the drop is planned or unintended. For improvisation of the accuracy of detection we recommend to utilize the correlations among lost packets and for ensuring of these correlations calculations, we build up a homomorphic linear authenticator based structure of public auditing allowing the detector to confirm truth of packet loss data reported by nodes.  This structure is collusion proof, privacy preserving, and incur low communication as well as storage overheads.  Our proposed system considers cross-statistics between lost packets to make a additional informative decision, and as a result is in sharp difference to conventional methods that depend only on distribution of number of lost packets.


Privacy preserving; Malicious; Link errors; Packet losses; Insider attackers;


. S. Buchegger and J. Y. L. Boudec, “Performance analysis of the confidant protocol (cooperation of nodes: Fairness in dynamic adhoc networks),” in Proc. 3rd ACM Int. Symp. Mobile Ad Hoc Netw. Comput. Conf., 2002, pp. 226–236.

. L. Buttyan and J. P. Hubaux, “Stimulating cooperation in selforganizing mobile ad hoc networks,” ACM/Kluwer Mobile Netw. Appl., vol. 8, no. 5, pp. 579–592, Oct. 2003.

. J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostring, “Modelling incentives for collaboration in mobile ad hoc networks,” presented at the First Workshop Modeling Optimization Mobile, Ad Hoc Wireless Netw., Sophia Antipolis, France, 2003.

. W. Kozma Jr., and L. Lazos, “REAct: Resource-efficient accountability for node misbehavior in ad hoc networks based on random audits,” in Proc. ACM Conf. Wireless Netw. Secur., 2009, pp. 103–110.

. K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, “An acknowledgement- based approach for the detection of routing misbehaviour in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2006.

. Y. Liu and Y. R. Yang, “Reputation propagation and agreement in mobile ad-hoc networks,” in Proc. IEEE WCNC Conf., 2003, pp. 1510–1515.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2018, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at