Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Hidden Traffic Pattern from Disclosure Attack in MANETs


Affiliations
1 ME Communication Systems Engineering, Anna University, DSCE, Coimbatore, India
2 Dept of Electronics and Communication Engineering, DSCE, Coimbatore, India
     

   Subscribe/Renew Journal


Number of techniques has been proposed based on packet encryption to protect the communication in MANETs. STARS functioning based on stastical characteristics of captured raw traffic. STARS discover the relationships of source to destination communication.

 To prevent STAR attack an source hidding technique is introduced. The traffic pattern aims to derive the source/destination probability distribution. That is the probability for each node to entire traffic captured with link details message source/destination and the end-to-end link probability distribution that is the probability for each pair of nodes to be an end-to-end communication pair. Hence construct point-to-point traffic originate and then derive the end-to-end traffic with a set of traffic filtering rules; thus actual traffic protected from disclosure attack. Through this protective mechanism efficiency of traffic increased by 95% from attacked traffic. For further enhancement to avoid overall attacks second shortest path is selected.


User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 200

PDF Views: 2




  • Hidden Traffic Pattern from Disclosure Attack in MANETs

Abstract Views: 200  |  PDF Views: 2

Authors

K. R. Rini
ME Communication Systems Engineering, Anna University, DSCE, Coimbatore, India
M. Thamilarasu
Dept of Electronics and Communication Engineering, DSCE, Coimbatore, India

Abstract


Number of techniques has been proposed based on packet encryption to protect the communication in MANETs. STARS functioning based on stastical characteristics of captured raw traffic. STARS discover the relationships of source to destination communication.

 To prevent STAR attack an source hidding technique is introduced. The traffic pattern aims to derive the source/destination probability distribution. That is the probability for each node to entire traffic captured with link details message source/destination and the end-to-end link probability distribution that is the probability for each pair of nodes to be an end-to-end communication pair. Hence construct point-to-point traffic originate and then derive the end-to-end traffic with a set of traffic filtering rules; thus actual traffic protected from disclosure attack. Through this protective mechanism efficiency of traffic increased by 95% from attacked traffic. For further enhancement to avoid overall attacks second shortest path is selected.