Professional Documents
Culture Documents
Detection and prevention of congestion attacks and packet loss using piggyback methods in wireless network
M.Gowsalya1,
Research Scholar Department of Computer Science & Engg Alagappa university Karaikudi-630 003
1
Abstract - Network security involves the authorization of access to data in a network, which is controlled by the network administrator. In this paper, we investigate the problem of packet loss over the wireless communication and the congestions that are taken place. To prevent the packet loss, we propose the idea of Piggybacking by which the data can be transfer between the server and the client on the secure manner. Moreover the complete data will be encrypted before the transmission takes place. The RSA algorithm is used for the encryption and the decryption purpose. The encrypted data will then piggybacked by which the data is hided and then moved to the destinations. Through this the congestion on the network can be controlled. Keywords: Network Security, Wireless Communications, piggybacking, Encryption. I. INTRODUCTION Wireless networks rely on the uninterrupted availability of the wireless medium to interconnect participating nodes. However, the open nature of this medium leaves it vulnerable to multiple security threats. Anyone with a transceiver can eavesdrops on wireless transmissions, inject spurious messages, or jam legitimate ones. While eavesdropping and message injection can be prevented using cryptographic methods, jamming attacks are much harder to counter. They have been shown to actualize severe Denial-of-Service (DoS) attacks against wireless networks. In the simplest form of jamming, the adversary interferes with the reception of messages by transmitting a continuous jamming signal, or several short jamming pulses Network Security is becoming more and more crucial as the volume of data being exchanged on the internet access. The security involves four important aspects: Confidentiality, message authentication, integrity and non repudiation. Popular application of multimedia technology, and increasingly transmission ability of network gradually leads us to acquire, information directly and clearly through images. Hence, image security has become a critical and imperative issue.
Cryptography is the process of transforming information (plain text/Image) into unintelligible form (Cipher text/ Cipher Image).The technology of encryption is called cryptology. For encryption the RSA algorithm is used to encrypt and decrypt the text, because it is considered as a better solution for data encryption. In cryptography, RSA is an algorithm for public key cryptography. The RSA algorithm involves the use of two Keys a public key, which may be known by anybody, and can be used to encrypt Messages a private key, known only by the recipient, and used to decrypt messages. Cryptography defines the art of transforming data into sequence of bits that appears as random and meaningless to a site observer or attacker. It relates to the study of mathematical techniques related to the aspects of information security such as confidentiality, data integrity, entity authentication, data origin authentication. It protects information by transferring it into unreadable form. The process of sending data along with the acknowledgment is called piggybacking. Piggybacking is distinct from war driving, which involves only the logging or mapping of the existence of access points. Piggybacking on Internet access is the practice of establishing a wireless Internet connection by using another subscriber's wireless Internet access service without the subscriber's explicit permission or knowledge. It is a legally and ethically controversial practice, with laws that vary by jurisdiction around the world. While completely outlawed or regulated in some places, it is permitted in others. The paper is organized as follows. In section 2 the related works are discussed. In section 3 the research contribution over the encryption and piggybacking are discussed. In section 4 the results of the evaluated parameters are discussed. With section 5 the paper is concluded.
ISSN: 2231-5381
http://www.internationaljournalssrg.org
Page 301
Fig -2 The Message to be transmitted. 3.2 A Strong Hiding Commitment Scheme (Shcs) In this paper, we propose a strong hiding commitment scheme that is based on the symmetric cryptography method. Main impetus is to satisfy the strong hiding property while keeping the computation and the communication overhead to a minimum. The proposed SHCS requires the joint consideration of the MAC and PHY layers. To reduce the overhead the de-commitment value or the decryption key value is done in the same packet in which the encryption is taken place. A new sub layer is found between the existing two layers, which is responsible for the packet formatting and data hiding. It will form as a frame structure. The purpose of this is to randomize the input to the encryption algorithm.
ISSN: 2231-5381
http://www.internationaljournalssrg.org
Page 302
REFERENCES
Fig -3 The User Defined Text is encrypted.
[1]Alejandroproano and Loukas Lazos, Packet Hiding Methods for preventing Selective Jamming attacks, In: IEEE ICC 2010. [2]T.X.Brown, J.E.James and A.Sethi , Jamming ans sensing of encrypted wireless ad hoc networks . In proceedings of Mobihoc, pages 120-130, 2006. [3]D.Comer , Internetworking with TCP/IP : Principles, Protocols,and Architecture,Prentice Hall,2006. [4]G.Noubir and G.Lin ,Low power DoS attacks in data wireless LANs and countermeasures , ACM SIGMOBILE MobileComputing and Communications review,7(3):29-30,2003. [5]O.Goldreich, Foundations of Cryptography: Basic applications, Cambridge University Press, 2004. [6]I.Venkata Saj Manoj ,Cryptography and Steganography, International Journal of Computer Applications (0095 8887), Volume 1No. [7]G.Lin and G.Noubir . On link layer Denial of service in data wireless LANs. Wireless communications and Mobile Computing, 5(3):273-284, May 2004. [8]M.Cagalj, S. Capkun, and J.P.Hubaux, Wormhole-based anticongestion texhniques in sensor networks.IEEE Transactions on Mobile Computing, 6(1):100-114, 2007. [9]M.Wilhelm, I.Martinovic , J.Schmitt, and V.Lenders. Reactive Jamming in Wireless Networks: How realistic is the threat? In proceddings of Wisec, 2011.
Fig -4 The Data is transmitted to the requested clients. 3.4 Piggybacking Technique In this paper, we proposed a novel method using piggybacking technique of packet loss during large volume of packets sent to more number of clients. At the decryption end, the data in huge volume will be loss due to congestions. But by piggybacking the packets along with the header and sequence ID and the host name the data will be send directly to the selected host. Hence, the data will be buffered and after that process the data will be sending to all the clients that are alive on the network. Thus the piggybacking techniques the data will be directly send to the client network, after the acknowledgement is received. The TCP protocol is responsible for the processing.
BIOGRAPHY M.GOWSALYA Miss.M.GOWSALYA is a Research scholar in the Department of Computer Science and Engineering, Alagappa University, Karaikudi, Tamilnadu, India. She has received her M.Sc in Computer Science from Alagappa University,Karaikudi, Tamilnadu in the year of 2011. She has presented her work in International and National level conferences. Her areas of research interests include network security. Dr.V.PALANISAMY Prof. Dr V.PALANISAMY is working as an Associate Professor in the Department of Computer Science and Engineering, Alagappa University, Karaikukdi, Tamilnadu.
ISSN: 2231-5381
http://www.internationaljournalssrg.org
Page 303