Piggy backing technique
Transcript of Piggy backing technique
7/28/2019 Piggy backing technique
http://slidepdf.com/reader/full/piggy-backing-technique 1/3
International Journal of Engineering Trends and Technology- Volume3Issue3- 2012
ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 301
Detection and prevention of congestion attacks
and packet loss using piggyback methods in
wireless network M.Gowsalya
1,V.Palanisamy
2MCA. M.Tech., P.hd
Research Scholar 1 Associate Professor 2
Department of Computer Science & Engg Department of Computer Science & Engg
Alagappa university Alagappa University
Karaikudi-630 003 karaikudi-630 003
Abstract - Network security involves the authorization of
access to data in a network, which is controlled by the network administrator. In this paper, we investigate the problem of packet loss over the wireless communication
and the congestions that are taken place. To prevent the packet loss, we propose the idea of Piggybacking by which the data can be transfer between the server and the client on the secure manner. Moreover the complete data will be
encrypted before the transmission takes place. The RSA algorithm is used for the encryption and the decryption purpose. The encrypted data will then piggybacked bywhich the data is hided and then moved to the destinations. Through this the congestion on the network
can be controlled.
Keywords: Network Security, Wireless Communications,
piggybacking, Encryption.
I. INTRODUCTION
Wireless networks rely on the uninterrupted availability of the wireless medium to interconnect participating nodes. However, the open nature of this
medium leaves it vulnerable to multiple security threats.Anyone with a transceiver can eavesdrops on wireless
transmissions, inject spurious messages, or jam legitimateones. While eavesdropping and message injection can be prevented using cryptographic methods, jamming attacks
are much harder to counter. They have been shown toactualize severe Denial-of-Service (DoS) attacks against
wireless networks. In the simplest form of jamming, theadversary interferes with the reception of messages by
transmitting a continuous jamming signal, or several short jamming pulses
Network Security is becoming more and morecrucial as the volume of data being exchanged on the
internet access. The security involves four importantaspects: Confidentiality, message authentication, integrityand non – repudiation. Popular application of multimedia
technology, and increasingly transmission ability of network gradually leads us to acquire, information directlyand clearly through images. Hence, image security has
become a critical and imperative issue.
Cryptography is the process of transforminginformation (plain text/Image) into unintelligible form(Cipher text/ Cipher Image).The technology of encryption
is called cryptology. For encryption the RSA algorithm is
used to encrypt and decrypt the text, because it isconsidered as a better solution for data encryption. In
cryptography, RSA is an algorithm for public keycryptography. The RSA algorithm involves the use of twoKeys a public key, which may be known by anybody, and
can be used to encrypt Messages a private key, known only by the recipient, and used to decrypt messages.
Cryptography defines the art of transforming datainto sequence of bits that appears as random and
meaningless to a site observer or attacker. It relates to thestudy of mathematical techniques related to the aspects of information security such as confidentiality, data integrity,
entity authentication, data origin authentication. It protectsinformation by transferring it into unreadable form.
The process of sending data along with theacknowledgment is called piggybacking. Piggybacking isdistinct from war driving, which involves only the logging
or mapping of the existence of access points. Piggybackingon Internet access is the practice of establishing a wirelessInternet connection by using another subscriber's
wireless Internet access service without the subscriber'sexplicit permission or knowledge. It is a legally and ethically controversial practice, with laws that vary by
jurisdiction around the world. While completely outlawed
or regulated in some places, it is permitted in others.
The paper is organized as follows. In section 2 therelated works are discussed. In section 3 the research
contribution over the encryption and piggybacking arediscussed. In section 4 the results of the evaluated parameters are discussed. With section 5 the paper isconcluded.
7/28/2019 Piggy backing technique
http://slidepdf.com/reader/full/piggy-backing-technique 2/3
International Journal of Engineering Trends and Technology- Volume3Issue3- 2012
ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 302
II. RELATED WORK
Alejandroproano and Loukas Lazos in their paper proposed the methods for the packet hiding in jamming
attacks.T.X.Brown, J.E.James and A.Sethi in their paper proposed the encryption technique taken place in thewireless networks.
D.Comer, Internetworking with TCP/IP: Principles,
Protocols, and Architecture,Prentice Hall,2006.
O.Goldreich in his proposed paper discusses about
the basic applications of the cryptography and their encryption decryption formulas. G.Lin and G.Noubir intheir paper proposed discusses about the denial of service
attacks and their threats in the Local Area Connected networked. This is referred in the denial of service attack while the piggybacking takes place.
In the Internetworking with TCP/IP: Principles,
Protocols and the architecture by D.Comer the varioustypes of the protocols used, the basic architecture for thecongestion control and piggyback the selected packets are
taken place.
In the paper proposed by M.Cagalj, S.Capkun and
J.P.Habuax, the wormhole – based congestion technique inthe sensor networks the types of the congestion, theflooding basics the congestion prevention and avoidance
are referred in this work.
In the short paper work proposed by M.Wilhelmand I.Martinovic, J.Schmitt and V.Lenders the “Reactive jamming in the wireless networks: How realistic is thethreat?” the jamming attacks, principles and the selective
packet hiding techniques are referred.
I.Venkata Saj Manoj in his paper proposed thevarious method and the techniques used in theSteganography and the cryptography.
III. RESEARCH CONTRIBUTION
Piggybacking is well known and extensively used for real – world applications. For large packets such as I,
the source produces a further compressed packet bydiscarding the less- important bits and attaches this small
and redundant packet to data packet i+1.
In this proposed work we propose two newmethodologies to send data between the server and numerous clients in the secure manner. First the dataencryption technique is handled by the RSA Algorithm.Secondly the encrypted text is transfer over the network
.When the decryption is done on the clients there the piggy backing operation takes place. For packet hiding techniquethe A Strong Hiding Commitment Scheme (SHCS) is
implemented.
3.1 Congestion Control and Packet Classification
One of the major problems in the wirelesscommunication is the congestion control and avoidance
problem. We, in this proposed paper addressed the problemof discerning congestion attacks in the wireless networks.We considered an internal adversary model which is
responsible for the congestion. In the adversary model, inthat which the congestion is taken place as a part and hence
easily identified and prevented.
The Adversary model proposed here is responsible
for the packet classification in the in real time applications.Once the packet is classified, the adversary is responsibleto choose the technique for jamming avoidance.
Fig -1 The IP Address and the Host Name
Fig -2 The Message to be transmitted.
3.2 A Strong Hiding Commitment Scheme (Shcs)
In this paper, we propose a strong hiding
commitment scheme that is based on the symmetriccryptography method. Main impetus is to satisfy the stronghiding property while keeping the computation and the
communication overhead to a minimum. The proposed SHCS requires the joint consideration of the MAC and PHY layers. To reduce the overhead the de-commitment
value or the decryption key value is done in the same packet in which the encryption is taken place.
A new sub layer is found between the existing twolayers, which is responsible for the packet formatting and
data hiding. It will form as a frame structure. The purposeof this is to randomize the input to the encryptionalgorithm.
3.3 Encryption of Data
7/28/2019 Piggy backing technique
http://slidepdf.com/reader/full/piggy-backing-technique 3/3
International Journal of Engineering Trends and Technology- Volume3Issue3- 2012
ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 303
The data is encrypted by using the RSA
Algorithm. It is the public key algorithm that uses the huge prime numbers in their factoring and their multiples as thecode or key to encode the data given. Since the key size is
large the intruders cannot be easily able to hack the data.Through this RSA (Rivest, Shamir, Adleman) algorithmthe data will be more secure.
Fig -3 The User Defined Text is encrypted.
Fig -4 The Data is transmitted to the requested clients.
3.4 Piggybacking Technique
In this paper, we proposed a novelmethod using piggybacking technique of packet loss duringlarge volume of packets sent to more number of clients. At
the decryption end, the data in huge volume will be lossdue to congestions. But by piggybacking the packets alongwith the header and sequence ID and the host name the datawill be send directly to the selected host.
Hence, the data will be buffered and after that
process the data will be sending to all the clients that arealive on the network. Thus the piggybacking techniques thedata will be directly send to the client network, after the
acknowledgement is received. The TCP protocol isresponsible for the processing.
Fig -5 The Data is transmitted without Packet loss.
IV. CONCLUSION
In this paper, we propose a new technique for thesecurity of the data by piggyback the data with the
sequence ID and with the host name. Along with the piggybacking we also maintain the strong hiding schemethat provides the packet from loss and stored in the buffer.
The congestion control is maintained in this paper byfollowing the sequential number ID of the packets. In the
wireless network, the confidentiality of the data is moreimportant aspect and is maintained in this paper by piggybacking the packets without loss.
REFERENCES
[1]Alejandroproano and Loukas Lazos, Packet Hiding Methods for
preventing Selective Jamming attacks, In: IEEE ICC 2010.
[2]T.X.Brown, J.E.James and A.Sethi , Jamming ans sensing of encrypted
wireless ad hoc networks . In proceedings of Mobihoc, pages 120-130,
2006.
[3]D.Comer , Internetworking with TCP/IP : Principles, Protocols,and
Architecture,Prentice Hall,2006.
[4]G.Noubir and G.Lin ,Low –power DoS attacks in data wireless LAN’s
and countermeasures , ACM SIGMOBILE MobileComputing and
Communications review,7(3):29-30,2003.
[5]O.Goldreich, Foundations of Cryptography: Basic applications,
Cambridge University Press, 2004.
[6]I.Venkata Saj Manoj ,”Cryptography and Steganography”,
International Journal of Computer Applications (0095 – 8887), Volume 1-
No.
[7]G.Lin and G.Noubir . On link layer Denial of service in data wireless
LANs. Wireless communications and Mobile Computing, 5(3):273-284,
May 2004.
[8]M.Cagalj, S. Capkun, and J.P.Hubaux, Wormhole-based anticongestion
texhniques in sensor networks.IEEE Transactions on Mobile Computing,
6(1):100-114, 2007.
[9]M.Wilhelm, I.Martinovic , J.Schmitt, and V.Lenders. Reactive
Jamming in Wireless Networks: How realistic is the threat? In
proceddings of Wisec, 2011.
BIOGRAPHY
M.GOWSALYA
Miss.M.GOWSALYA is a Research scholar in theDepartment of Computer Science and Engineering,
Alagappa University, Karaikudi, Tamilnadu, India. She hasreceived her M.Sc in Computer Science from AlagappaUniversity,Karaikudi, Tamilnadu in the year of 2011. She
has presented her work in International and National levelconferences. Her areas of research interests include
network security.
Dr.V.PALANISAMY
Prof. Dr V.PALANISAMY is working as an
Associate Professor in the Department of Computer
Science and Engineering, Alagappa University,
Karaikukdi, Tamilnadu.