TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

Similar documents
Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security.

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

MDR Based Cooperative Strategy Adaptation in Wireless Communication

Mobile ad hoc networks Various problems and some solutions

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Packet Estimation with CBDS Approach to secure MANET

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

IEEE networking projects

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Wireless Network Security Spring 2014

Subject: Adhoc Networks

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Application of Graph Theory in DTN Routing

Pseudonym Based Security Architecture for Wireless Mesh Network

Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

An Efficient and Secured way of Routing in Hybrid WSN

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

OVERCOME VAMPIRE ATTACKS PROBLEM IN WIRELESS AD-HOC SENSOR NETWORK BY USING DISTANCE VECTOR PROTOCOLS

Figure 1. Clustering in MANET.

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING

Wireless Network Security Spring 2013

International Journal of Scientific & Engineering Research Volume 9, Issue 4, April ISSN

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

Introduction and Statement of the Problem

Security in Ad Hoc Networks Attacks

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Routing Protocols in MANETs

Overview of Challenges in VANET

INNOVATIVE SCIENCE AND TECHNOLOGY PUBLICATIONS. Manuscript Title A PACKET DROPPING ATTACK DETECTION FOR WIRELESS AD HOC NETWORK USING KEY MANAGEMENT

Reducing the Communication and Processing Overhead and Ensuring the Security in Multihop Wireless Networks - using RACE Mechanism

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks

Sybil Attack Detection in Mobile Adhoc Network

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

All Rights Reserved 2017 IJARCET

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Secure Routing and Transmission Protocols for Ad Hoc Networks

A Secure Routing Protocol for Wireless Adhoc Network Creation

Wireless Network Security Spring 2013

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Efficient Message Caching Scheme for MANET

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

SUMMERY, CONCLUSIONS AND FUTURE WORK

A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Black Hole Detection Scheme in WSN for Mobile Replica Node Detection and Rejection

Malicious Node Detection in MANET

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

Privacy in VANET using Shared Key Management

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

S. Indirakumari, A. Thilagavathy

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Wireless Network Security Spring 2015

ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic. Message Ferrying

AN AD HOC NETWORK is a group of nodes without requiring

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Routing protocols in WSN

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

A Light Weight Payment Report Scheme for Multihop Wireless Networks

Detection of Vampire Attack in Wireless Adhoc

Public Key Management Scheme with Certificate Management Node for Wireless Ad Hoc Networks

A STUDY ON CURRENT TRENDS IN VEHICULAR AD HOC NETWORKS

A Surveying on Road Safety Using Vehicular Communication Networks

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Defenses against Wormhole Attack

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Privacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH

Detection of Wormhole Attacks in Wireless Sensor Networks

Energy Efficient EE-DSR Protocol for MANET

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks

Transcription:

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD Cum Assistant Professor, Bharathiyar Arts and Science College for Women, India 1 bhuvanapriyamca@gmail.com, 2 vijisylvia@gmail.com, Abstract : In computing area the Location-Based services take advantage of user location information and provide mobile users with various resources and services. The common theme across these location sensitive applications is that they offer a reward or benefit to users located in a certain geographical location at a certain time. Thus, users have the incentive to cheat on their locations. Location-sensitive applications require users to prove that they really are (or were) at the claimed locations. Nowadays, more and more location-based applications and services require users to provide location proofs at a particular time. Mobile users have devices capable of discovering their locations, some users may cheat on their locations and there is a lack of secure mechanism to provide their current or past locations to applications and services. One possible solution is to build a trusted computing module on each mobile device to make sure trusted GPS data is generated and transmitted. Although cellular service providers have tracking services that can help to verify the locations of mobile users in real time, the accuracy is not good enough and the location history can not be verified. INTRODUCTION Recently, several systems have been designed to let end users prove their locations through WiFi infrastructures. We propose A Privacy-Preserving Location proof Updating System (APPLAUS), which does not rely on the wide deployment of network infrastructure or the expensive trusted computing module. In APPLAUS, Bluetooth enabled mobile devices in range mutually generate location proofs, which are used for trusted location to monitor the proof server. Mobile nodes communicate with neighboring nodes through Bluetooth and communicate with the untrusted server through the cellular network interface. According to Location proof updating system based on different roles they play in the process of location proof updating, they are categorized as Prover, Witness, Location Proof Server, Certificate Authority or Verifier. For control forwarding packet loss from the Disruption tolerant networks (DTNs) exploit the intermittent connectivity between mobile nodes to transfer data. Due to a lack of consistent connectivity, two nodes exchange data only when they move into the transmission range of each other (which is called a contact between them). Routing misbehavior will significantly reduce the packet delivery ratio and waste the resources of the mobile nodes that have carried and forwarded the dropped packets and also power loss and buffer overflows. To demonstrate this, we simulate the effects of routing misbehavior in two popular DTN routing algorithms, SimBet and Delegation based on the Reality trace. Then we propose a scheme to mitigate routing misbehavior by limiting the number of packets forwarded to the misbehaving nodes. Introduces both routing and security model for examine those nodes from packet loss. By this mechanism we control the packet loss and also used more specifically, we use statistically updated pseudonyms at each mobile device to protect location privacy from each other, and from the untrusted location proof server. For CA verification, we use TKIP (temporal key integrity protocol), it s a security protocol used in mobile adhoc networks(ieee 802.11).It has wireless network standards and designed to focus on encryption of data/packets in location proof systems. In order to defend against colluding attacks, we also present betweenness ranking-based and correlation clustering-based approaches for outlier detection. An extensive experimental and simulation result based on multiple data sets show that APPLAUS can effectively provide location proofs, significantly preserve the source location privacy, and effectively detect colluding attacks and also avoids packet loss by mitigation detection scheme. Atlas, implementation shown in simulation results. 27

PROBLEM IDENTIFACTION AND SOLUTION In wireless network location proof updating system faces packet loss problems and We develop a mobile station with user-centric location privacy model in which individual users evaluate their location privacy levels in real time and decide whether and when to accept a location proof request.to transfer the data packet from source to destination commonly user TCP/IP protocol in networking. In this TCP/IP process is before transfer the data the connection has been established. Each node forwards the query to the next node. During the lookup process no information is send back to the originator, resulting in less packet overhead. To make the routing strategy perform best, we present an efficient routing strategy, called tracer routing. Tracer routing enables the initiator to trace the whole routing process. To detect the packet loss and reduce the traffic occurs in network we use DTN and Mitigating scheme technique and use encryption mechanism to update the pseudonyms statistically. PROBLEM DESCRIPTION MODULES Mobility Network Formation Module User Interface Design Routing and Security Model Record Summary and Contact Record Witeness Node - Misreporting Detection Black List MOBILITY NETWORK FORMATION MODULE We contribute to a more systematic understanding and treatment of sensor deployment issues. For this purpose, we studied the existing literature on deployment experience and present a classification of common problems encountered during deployment of sensor networks. A wireless network that is temporarily installed alongside the actual sensor network during the deployment process. Parameters considered during sensor network formation Transmission range: nodes communication depends under transmission range which is placed nearly close to each other thus gets better link. Local information system: Nodes must be grouped under specific feature like battery power, processing capability, bandwidth, memory etc. so according to those, nodes are partitioned using driver methods. Mobility: Mobility refers the node movement procedure so need to consider the mobility options with limitation in maximum and minimum speed. USER INTERFACE DESIGN The goal of user interface design is to make the user's interaction as simple and efficient as possible, in terms of accomplishing user goals what is often called user-centered design. Good user interface design facilitates finishing the task at hand without drawing unnecessary attention to it. Graphic design may be utilized to support its usability. The design process must balance technical functionality and visual elements (e.g., mental model) to create a system that is not only operational but also usable and adaptable to changing user needs. 28

Fig 1 Updation of User Nodes ROUTING AND SECURITY MODEL We describe each node has two separate buffers. One has unlimited space and is used to store its own packets; the other one has limited space and is used to store packets received from other nodes. We determine the network is loosely synchronized; i.e., any two nodes should be in the same time slot at any time. Since the intercontact time is usually at the scale of minutes or hours, the time slot can be at the scale of one minute. Thus, such loose time synchronization is not hard to achieve.there are two types of nodes: misbehaving nodes and normal nodes. A misbehaving node drops the received packets even if it has available buffers,1 but it does not drop its own packets. It may also drop the control messages of our detection scheme. We assume a small number of misbehaving nodes may collude to avoid being detected, and they may synchronize their actions via out-band communication channels.in some Mobile stations, each packet has a certain lifetime, and then expired packets should be dropped whether or not there is buffer space. Such dropping can be identified if the expiration time of the packet is signed by the source. We assume a public-key authentication service is available. In identity-based authentication, only the offline trusted private key generator can generate a public/private key pair, so a misbehaving node itself cannot forge node identified and detected by using APPLAUS and DTD Mechanism and also helpful to give indications to other nodes. RECORD SUMMARY AND CONTACT RECORDS The two nodes also exchange their current vector of buffered packets (as a step of contact record generation). In this way, one node knows the two sets of packets the other node buffers at the beginning of the previous contact and the beginning of the current contact, which are denoted by and, respectively. It also knows the two sets of packets the other node sends and receives in the previous contact, which are denoted by and a misbehaving node may drop a packet but keep the packet ID, pretending that it still buffers the packet. The next contacted node may be a better relay for the dropped packet according to the routing protocol, which can be determined when the two exchange the destination (included in packet ID) of the buffered packets. In this case, the misbehaving node should forward the packet to the next contacted node, but it cannot since it has dropped the packet in such cases we use an in order to defend against colluding attacks, and betweenness ranking-based and correlation clustering-based approaches for outlier detection. Thus, the next contacted node can easily detect this misbehavior and will not forward packets to this misbehaving node. WITENESS NODE - MISREPORTING DETECTION Detection: To detect the inconsistency caused by misreporting, for each contact record generated and received in a contact, a node selects random nodes as the witness nodes of this record, and transmits the summary of this record to them when it contacts them. It selects the witness nodes from the nodes that it has directly contacted. Here, the nodes contacted a long time ago are not used since they may have left the network. 29

Fig 2 Detection of Nodes in Network Shown In Graphs. Alarm: After detection, the witness node floods an alarm to all other nodes. The alarm includes the two inconsistent summaries. When a node receives this alarm, it verifies the inconsistency between the included summaries and the signature of the summaries. If the verification succeeds, this node adds the appropriate misreporting node into a blacklist and will not send any packets to it. If the verification fails, the alarm is discarded and will not be further propagated. A misreporting node will be kept in the blacklist for a certain time before being deleted. A node deletes the record that it generates in a contact after the contact has been purged out of its report window, probably after a few contacts. It deletes the records received from the contacted node right after this contact, since these received records are only used to check if the contacted node has dropped packets recently. The witness node should keep its collected record summaries for a long enough time to detect misreporting. For simplicity, our scheme uses a time-to-live parameter, which denotes the time for the collected summaries to be stored before being deleted. BLACK LIST To mitigate routing misbehavior, we try to reduce the number of packets sent to the misbehaving nodes. If a node is detected to be misreporting, it should be blacklisted and should not receive packets from others. We cannot simply blacklist it because it is dropping packets, since a normal node may also drop packets due to buffer overflow. So we used mitigating routing and detection scheme used in this case and we focus on how to detect nodes from without affecting and normal nodes from misreporting. Our basic idea is to maintain a metric forwarding probability (FP) for each node based on if the node has dropped, received and forwarded packets in recent contacts, which can be derived from its reported contact records. The nodes that frequently drop packets but seldom forward packets will have a small FP and will receive few packets from others. Our scheme borrows ideas from congestion control to update FP. More specifically, it combines additive increase, additive decrease, and multiplicative decrease to differentiate misbehaving nodes from normal nodes. CONCLUSION A privacy-preserving location proof updating system called APPLAUS, where collocated Bluetooth enabled mobile devices mutually generate location proofs and upload to the location proof server. We use statistically changed pseudonyms for each device to protect source location from the untrusted location proof server. We presented a scheme to detect packet dropping in DTNs. The detection scheme works in a distributed way, each node detects packet dropping locally based on the collected information. Analytical results on detection probability and detection delay were also presented. We also develop a user-centric location privacy model in which individual users evaluate their location privacy levels in real time and decide whether and when to accept a location proof exchange request based on their location privacy levels. To deal with colluding attacks, we proposed betweenness ranking based and correlation clustering-based approaches for outlier detection. Moreover, the detection scheme can effectively detect misreporting even when some nodes collude. Extensive experimental and simulation results show that APPLAUS can provide real-time location proofs effectively. 30

The proposed scheme is very generic and it does not rely on any specific routing algorithm. Trace-driven simulations show that our solutions are efficient. Moreover, it preserves source location privacy and it is collusion resistant. REFERENCES [1] A.R. Beresford and F. Stajano, Location Privacy in Pervasive Computing, IEEE Security and Privacy, 2003. [2] U. Brandes, A Faster Algorithm for Betweenness Centrality, J. Math. Sociology, vol. 25, no. 2, pp. 163-177, 2001. [3] S. Brands and D. Chaum, Distance-Bounding Protocols, Proc. Workshop Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT 93), 1994. [4] L. Buttya n, T. Holczer, and I. Vajda, On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs, Proc. Fourth European Conf. Security and Privacy in Ad-Hoc and Sensor Networks, 2007. [5] S. Capkun and J.-P. Hubaux, Secure Positioning of Wireless Devices with Application to Sensor Networks, Proc. IEEE INFOCOM, 2005. [6] L.P. Cox, A. Dalton, and V. Marupadi, SmokeScreen: Flexible Privacy Controls for Presence-Sharing, Proc. ACM MobiSys, 2007. 31