International Journal of Advance Engineering and Research Development

Similar documents
International Journal of Advance Research in Computer Science and Management Studies

A Secure Routing Protocol for Wireless Adhoc Network Creation

Public Key Algorithms

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Catching BlackHole Attacks in Wireless Sensor Networks

Sybil Attack Detection in Mobile Adhoc Network

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

A Review on Black Hole Attack in MANET

International Journal of Scientific Research and Reviews

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

Challenges in Mobile Ad Hoc Network

BCA III Network security and Cryptography Examination-2016 Model Paper 1

The Application of Elliptic Curves Cryptography in Embedded Systems

CSC 474/574 Information Systems Security

Securing MANETs using Cluster-based Certificate Revocation Method: An Overview

authentication will be required between roaming user, visited network and home network.

Secure Multiparty Computation

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing

Hybrid Public Key Cryptosystem Combining RSA & DES Algorithms

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

Webpage: Volume 4, Issue VI, June 2016 ISSN

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

CS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Performance Evaluation of Various Routing Protocols in MANET

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

Packet Estimation with CBDS Approach to secure MANET

Using Game Theory To Solve Network Security. A brief survey by Willie Cohen

Analysis of Cryptography and Pseudorandom Numbers

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Other Uses of Cryptography. Cryptography Goals. Basic Problem and Terminology. Other Uses of Cryptography. What Can Go Wrong? Why Do We Need a Key?

Cryptography and Network Security. Saint Leo University. COM 450- Network Defense and Security. Instructor: Dr. Omar.

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Cloud Computing: Security Issues & Solution

Hybrid Security Using Encryption Algorithm in Wireless Adhoc Network

Security: Cryptography

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

An efficient and practical solution to secure password-authenticated scheme using smart card

Pseudonym Based Security Architecture for Wireless Mesh Network

Performance Analysis and Enhancement of Routing Protocol in Manet

Generating A Digital Signature Based On New Cryptographic Scheme For User Authentication And Security

Mobile ad hoc networks Various problems and some solutions

RSA. Public Key CryptoSystem

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Chapter 9. Public Key Cryptography, RSA And Key Management

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Overview. Public Key Algorithms I

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network

Keywords Security, Cryptanalysis, RSA algorithm, Timing Attack

International Journal of Advance Research in Engineering, Science & Technology

Distributed Systems. Lecture 14: Security. 5 March,

On the security of a certificateless signature scheme in the standard model

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.

DETECTION OF COOPERATIVE BLACKHOLE ATTACK ON MULTICAST IN MANET

Computation of Multiple Node Disjoint Paths

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri

AES and DES Using Secure and Dynamic Data Storage in Cloud

Bloom Filter for Network Security Alex X. Liu & Haipeng Dai

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

Enhancedsecure sensor protocol with information via negotiation(sspin)

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

Security Architecture against Denial of Service Attacks in Wireless Mesh Network

Chapter 9 Public Key Cryptography. WANG YANG

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

Data Security for Wireless Mesh Network Using Onion Routing Algorithm Shruti Patil 1, Suvarna Kanakaraddi 2, Chetankumar Patil 3

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

Enhanced ECC algorithm over Public Key Cryptography

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Public Key Cryptography and the RSA Cryptosystem

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

Routing Protocols in Mobile Ad-Hoc Network

A Robust Trust Aware Secure Intrusion Detection for MANETs

Danube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks. Thilo Sauter Albert Treytl

Configuring attack detection and prevention 1

TRNG Based Key Generation for Certificateless Signcryption

IPv6 Traffic Hijack Test System and Defense Tools Using DNSSEC

Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol

A Survey on Secure Sharing In Cloud Computing

Cryptography and Network Security. Sixth Edition by William Stallings

Distributed Systems. Lecture 14: Security. Distributed Systems 1

I. INTRODUCTION. Manisha N. Kella * 1 and Sohil Gadhiya2.

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Transcription:

Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 BATCH SIGNATURE - ENERGY: MULTIPATH & MULTI PACKET SECURED DATA TRANSMISSION USING ENERGY LEVEL MONITORING PRAKASH.K.J, N.MAGESHKUMAR 1 Final Year IT, Department of IT, Jeppiaar Maamallan Engineering College, Chennai, India 2 Asst.Prof, Department of IT, Jeppiaar Maamallan Engineering College, Chennai, India Abstract The Data Sender will first split the packets into multiple batches and create Batch signature for every batch and then starts sending the packets to the destination. Secure access is one of the fundamental problems in wireless mobile networks. Digital signature is a widely used technique to protect messages, authenticity and node identities. From the practical perspective, to ensure the quality of services in wireless mobile networks, ideally the process of signature verification should introduce minimum delay. Batch cryptography technique is a powerful tool to reduce verification time. As it is Wireless network, multiple nodes has to transmit the data in the given network. If any node tries to inject any packet or remove any packet its ID will also be added to the Batch automatically. Verifier first verifies the info before transmitting the packets to the destination. We also implement node energy level estimation in order to verify whether the same node transmits the data or not. Keywords - Data Integrity Security, Deduplication, Cloud storage, Key Distribution I. INTRODUCTION Batch identification is a technique to find the bad signatures within a batch when the batch verification fails. Due to the inefficiency of individual identification, divide-and-conquer techniques have been proposed to improve the performance of batch identification. In Existing system they use a Batch Identification Game Model (BIGM) in WMNs, enabling nodes to identify invalid signatures with a reasonable delay under heterogeneous and dynamic attacks. To enhance the flexibility of our model, we subdivide BIGM into Batch Identification Game Model with Complete information (C- BIGM) and Batch Identification Game Model with Incomplete information (I-BIGM) to protect regular nodes from the attacks of invalid signatures in different scenarios. In our model, a mobile node may be a regular one or a malicious one, and the game occurs between a regular node and its malicious neighbours. The regular node, as a verifier aims at finding the invalid signatures to eliminate the impact of malicious nodes. The malicious neighbors, as attackers, intend to interpose batch verification process by broadcasting false messages signed by invalid signatures with different frequencies. Our main contributions are summarized as follows: To evaluate the effectiveness of batch identification, we recast three generic batch identification algorithms based on the group testing techniques. We analyze and compare the time complexities of these algorithms with experiments. We observe that none of them has universal advantages in all situations. Therefore, we need an auto-match scheme to choose the batch identification algorithm adaptively, when the attack strategy changes. We design a game model to find the dominant batch identification algorithm against various attack strategies. We analyze and prove the existence of Nash equilibriums in the complete information scenario and the incomplete information scenario, respectively. Note that the members in strategy set are alternative, as long as these generic batch identification algorithms have their own advantages under different attack strategies. Thus, our gamemodel provides a paradigm to select the dominant one to identify invalid signatures. Furthermore, BIGM is a generic solution, which can be equipped with any batch signature scheme._ Considering that the dominant strategy may not always be the optimal choice, we propose a selfadaptive automatch protocol to improve the selection accuracy of the batch identification algorithm based on history information. From the analysis and simulations, we find that it can effectively strengthen the prediction accuracy of nodes, states and the sensitivity of attack perception, and reduce the average identification delay of the whole network. The modes of data transmission is wired and wireless. Data transmission has a major development and security aspects has many problems. Many security problems are solved using various algorithm. The hackers are more intelligent to break the data transmission. So it become very tough to transmit the data without any interrupt and efficiency of data is also important. Many researchers consider the efficient technology for both wired and wireless network to increase their performance. Attackers can take advantage on security aspects illegally, If they not being caught and punished. Sensitive @IJAERD-2018, All rights Reserved 1034

data should be encrypted before sending so that it becomes difficult to retrieve data back to original form. This paper is about secured data transmission by multipath and multi packet using energy level monitoring. II. RELATED WORK Due to the openness characteristic in the wireless channel it becomes easy for the hacker node to interfere while transmission takes place. With the increasing number of mobile application, social media and GPS where humans life are inseparable by using these technologies. So it is very important to give a secured way of transmitting data in wireless channels. Because people transmits their personal information through these technologies. So their information must be sent in secured way without any interruption. This can be done by attaching a batch signature for each packet. But the signature verification may cause extra delay. To reduce these things the proposed system was derived. The Data Sender will first split the packets into multiple batches and create Batch signature for every batch and then starts sending the packets to the destination. As it is Wireless network, multiple nodes has to transmit the data in the given network. If any node tries to inject any packet or remove any packet its ID will also be added to the Batch automatically. Verifier first verifies the info before transmitting the packets to the destination. We also implement node energy level estimation in order to verify whether the same node transmits the data or not. Before transmission of packets the routes and the nodes are identified. Every node s ID and relevant Energy level is noticed by the verified before transmitting the packets. If any variation, then packets are discarded so that malicious packets are not transmitted. III. SYSTEM ARCHITECTURE First the data sender will send the dummy packet to the destination to identify the route and nodes present in route. The sender splits the data packet into three sub packet and for each packet unique batch signature id will be added. Each node has to know the before and next nodes id so that data can be transmitted. When the hacker node interrupts during data transmission its id will be added to the packet. The packet will be received by next node, while verifying it id will be changed so that node identifies the hacker interrupted and rejects the packet and ask the sender to resend the data. By this way the Batch signature verification and route identification is done. We also implement Energy level monitoring as energy is very important to transmit the data. For every data transmitted by the node its energy gets reduced. When low energy level node is selected to send a data it may transmit the data slow or data loss may occur. Hence alternate route is selected. When the energy of node changes more than 5 it identifies the node as malicious node and rejects the packet. By this way energy level verification is done. So through this way we are providing a secured data transmission to the receiver 1. SOURCE ROUTING IV. PROPOSED MODULES This module is developed in order to create a network construction. In a network, nodes are interconnected, which monitors all the other nodes. All nodes are sharing their information with each others. will be connected with each other to share its own ID to next and previous node. @IJAERD-2018, All rights Reserved 1035

Intermediate Destinat ion 2. PACKET SPLITTING In this user data will split into multiple packets with batch signature. Data should be splits and send into destination in secured way. Packet splitting is for security purpose Because if we send data in single packet without any signature there is a chance for loss data or hackers will easily hack the information. So we spilt it and add signature to every packet. p1 Data p2 Destin ation p3 3. BATCH SIGNATURE VERIFICATION Every node have to know their neighbor s node ID. Before sending the data from source to destination each node will know about the ID of next node. If data is send from one node to another node it will verify its ID with existing ID.If it match with existing signature, data will transfer to next node. If any packets are loss or added to it, that new ID will be added and send to next node so that it will discard that node by verifying its ID. Add ID Verify 4. ENERGY LEVEL MONITORING In this module energy level of every node is identified and set route to that path Because the energy level of node is important to transfer data. If low level energy node is selected to send data there is a chance to loss or delay to transfer the data. So we also identify the energy level of every node. Bend Dummy Package s 5.DYNAMIC REROUTING In this module node is constructed to transfer the data from source to destination. Before sending data path is identified to transfer the information. If selected route contain any traffic problem dynamic route is selected and send data through that dynamic route. @IJAERD-2018, All rights Reserved 1036

Bend Dummy Package s Dynamic Route Destination 6. Packets delivery After verifying node ID and batch signature data will be transferred from source to destination. If any variation, then packets are discarded so that malicious packets are not transmitted. Verify & Energy Level Send Data Destinat ion 1. Batch signature V.BATCH SIGNATURE ALGORITHM Batch is a important type of authentication in a public key cryptographic system. The batch signature verification may cause extra delay. To improve its performance the digital signature are computed into batch and allocating each batch only once. This increases the performance of transmission but it requires additional information to be carried out to the client. 2. Dynamic Routing The sender of the packet determines the complete sequence of nodes to forward the packet to the destination. It dynamically determines route based on cached information and result of the route discovery. To send a packet to another host, the sender constructs a source route in the packets header. Each mobile host participating in the ad hoc network maintains a route cache in which it caches source routes. If no route found, the sender may attempt to discover one using the route discovery protocol. Host monitors the correct operation of a route in use, we call route maintenance. The main advantage of using DSR is to allow multiple routes to any destination and allow each sender to select and control the route. Here no need to keep the routing table inside each node because the entire route is contained in the packet header. 3. RSA Algorithm Rivest Shamir Adleman algorithm is a public key encryption type algorithm in which one user uses a public key and other user uses a secret key. In this algorithm each station independently and randomly chooses two large primes p and q number and multiplies them to produce n=pq. The size of n is 1024 bits. Pick two large prime number p and q and calculate the n value. Get Public key as K u ={e,n}. Get Private key as K r ={d,n}. Encryption: Cipher text C=P e mod n Decryption: Plain text P=C d mod n @IJAERD-2018, All rights Reserved 1037

The main advantage of RSA as it can be used for both encryption as well as for digital signature. Trapdoor in RSA is in knowing value of n but not knowing the primes that are factors of n. VI. CONCLUSION Thus the proposed system provides security to the data. We attach the sender signature with node ID. By this way intermediate node and receiver node can able to know who is the sender. If any interruption while sending or any hacker can try to break the data, receiver can easily identify and block the hacker node. So through this way we are providing a secure data to the receiver. REFERENCES [1] J. Chen, K. He, Q. Yuan, G. Xue, R. Du and L. Wang, "Batch Identification Game Model for Invalid s in Wireless Mobile Networks," in IEEE Transactions on Mobile Computing, vol. 16, no. 6, pp. 1530-1543, June 1 2017. [2] A. Abouaomar, A. Filali and A. Kobbane, "Caching, device-to-device and fog computing in 5 th cellular networks generation : Survey," 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM), Rabat, 2017, pp. 1-6 [3] T. Li, H. Zhou, H. Luo, I. You and Q. Xu, "SAT-FLOW: Multi-Strategy Flow Table Management for Software Defined Satellite Networks," in IEEE Access, vol. 5, pp. 14952-14965, 2017. [4] A. T. Siwe and H. Tembine, "Network security as public good: A mean-field-type game theory approach," 2016 13th International Multi-Conference on Systems, Signals & Devices (SSD), Leipzig, 2016, pp. 601-606. [5] P. Pop, M. L. Raagaard, S. S. Craciunas and W. Steiner, "Design optimisation of cyber-physical distributed systems using IEEE time-sensitive networks," in IET Cyber-Physical Systems: Theory & Applications, vol. 1, no. 1, pp. 86-94, 12 2016 [6] Y. Liu, D. R. Bild, R. P. Dick, Z. M. Mao and D. S. Wallach, "The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities," in IEEE Transactions on Mobile Computing, vol. 14, no. 11, pp. 2376-2391, Nov. 1 2015. [7] J. Chen, K. He, R. Du, M. Zheng, Y. Xiang and Q. Yuan, "Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks," in IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 2, pp. 423-433, Feb. 2015 [8] L. Xiao, Y. Chen, W. S. Lin and K. J. R. Liu, "Indirect Reciprocity Security Game for Large-Scale Wireless Networks," in IEEE Transactions on Information Forensics and Security, vol. 7, no. 4, pp. 1368-1380, Aug. 2012. [9] L. Xiao, W. S. Lin, Y. Chen and K. J. R. Liu, "Indirect reciprocity game modeling for secure wireless networks," 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, 2012, pp. 928-933. @IJAERD-2018, All rights Reserved 1038