Piggy backing technique

3
7/28/2019 Piggy backing technique http://slidepdf.com/reader/full/piggy-backing-technique 1/3  International Journal of Engineering Trends and Technology- Volume3Issue3- 2012 ISSN: 2231-5381 http://www.internationaljournalssrg.org  Page 301 Detection and prevention of congestion attacks and packet loss using piggyback methods in wireless network M.Gowsalya 1, V.Palanisamy 2 MCA. M.Tech., P.hd  Research Scholar 1 Associate Professor 2  Department of Computer Science & Engg Department of Computer Science & Engg  Alagappa university Alagappa University Karaikudi-630 003 karaikudi-630 003  Abstract - Network security involves the authorization of  access to data in a network, which is controlled by the  network administrator. In this paper, we investigate the  problem of packet loss over the wireless communication  and the congestions that are taken place. To prevent the  packet loss, we propose the idea of Piggybacking by which  the data can be transfer between the server and the client  on the secure manner. Moreover the complete data will be encrypted before the transmission takes place. The RSA  algorithm is used for the encryption and the decryption  purpose. The encrypted data will then piggybacked by which the data is hided and then moved to the  destinations. Through this the congestion on the network  can be controlled.  Keywords: Network Security, Wireless Communications,  piggybacking, Encryption. I. INTRODUCTION Wireless networks rely on the uninterrupted availability of the wireless medium to interconnect  participating nodes. However, the open nature of this medium leaves it vulnerable to multiple security threats. Anyone with a transceiver can eavesdrops on wireless transmissions, inject spurious messages, or jam legitimate ones. While eavesdropping and message injection can be  prevented using cryptographic methods, jamming attacks are much harder to counter. They have been shown to actualize severe Denial-of-Service (DoS) attacks against wireless networks. In the simplest form of jamming, the adversary interferes with the reception of messages by transmitting a continuous jamming signal, or several short  jamming pulses  Network Security is becoming more and more crucial as the volume of data being exchanged on the internet access. The security involves four important aspects: Confidentiality, message authentication, integrity and non – repudiation. Popular application of multimedia technology, and increasingly transmission ability of network gradually leads us to acquire, information directly and clearly through images. Hence, image security has  become a critical and imperative issue. Cryptography is the process of transforming information (plain text/Image) into unintelligible form (Cipher text/ Cipher Image).The technology of encryption is called cryptology. For encryption the RSA algorithm is used to encrypt and decrypt the text, because it is considered as a better solution for data encryption. In cryptography, RSA is an algorithm for public key cryptography. The RSA algorithm involves the use of two Keys a public key, which may be known by anybody, and can be used to encrypt Messages a private key, known only  by the recipient, and used to decrypt messages. Cryptography defines the art of transforming data into sequence of bits that appears as random and meaningless to a site observer or attacker. It relates to the study of mathematical techniques related to the aspects of information security such as confidentiality, data integrity, entity authentication, data origin authentication. It protects information by transferring it into unreadable form. The process of sending data along with the acknowledgment is called piggybacking. Piggybacking is distinct from war driving, which involves only the logging or mapping of the existence of access points. Piggybacking on Internet access is the practice of establishing a wireless Internet connection by using another subscriber's wireless Internet access service without the subscriber's explicit permission or knowledge. It is a legally and ethically controversial practice, with laws that vary by  jurisdiction around the world. While completely outlawed or regulated in some places, it is permitted in others. The paper is organized as follows. In section 2 the related works are discussed. In section 3 the research contribution over the encryption and piggybacking are discussed. In section 4 the results of the evaluated  parameters are discussed. With section 5 the paper is concluded.

Transcript of Piggy backing technique

Page 1: Piggy backing technique

7/28/2019 Piggy backing technique

http://slidepdf.com/reader/full/piggy-backing-technique 1/3

 International Journal of Engineering Trends and Technology- Volume3Issue3- 2012

ISSN: 2231-5381 http://www.internationaljournalssrg.org  Page 301

Detection and prevention of congestion attacks

and packet loss using piggyback methods in

wireless network M.Gowsalya

1,V.Palanisamy

2MCA. M.Tech., P.hd 

 Research Scholar 1 Associate Professor 2

 Department of Computer Science & Engg Department of Computer Science & Engg

 Alagappa university Alagappa University

Karaikudi-630 003 karaikudi-630 003 

 Abstract - Network security involves the authorization of 

 access to data in a network, which is controlled by the network administrator. In this paper, we investigate the problem of packet loss over the wireless communication

 and the congestions that are taken place. To prevent the packet loss, we propose the idea of Piggybacking by which the data can be transfer between the server and the client on the secure manner. Moreover the complete data will be

encrypted before the transmission takes place. The RSA algorithm is used for the encryption and the decryption purpose. The encrypted data will then piggybacked bywhich the data is hided and then moved to the destinations. Through this the congestion on the network

 can be controlled.

 Keywords: Network Security, Wireless Communications,

 piggybacking, Encryption.

I. INTRODUCTION

Wireless networks rely on the uninterrupted availability of the wireless medium to interconnect participating nodes. However, the open nature of this

medium leaves it vulnerable to multiple security threats.Anyone with a transceiver can eavesdrops on wireless

transmissions, inject spurious messages, or jam legitimateones. While eavesdropping and message injection can be prevented using cryptographic methods, jamming attacks

are much harder to counter. They have been shown toactualize severe Denial-of-Service (DoS) attacks against

wireless networks. In the simplest form of jamming, theadversary interferes with the reception of messages by

transmitting a continuous jamming signal, or several short jamming pulses

 Network Security is becoming more and morecrucial as the volume of data being exchanged on the

internet access. The security involves four importantaspects: Confidentiality, message authentication, integrityand non – repudiation. Popular application of multimedia

technology, and increasingly transmission ability of network gradually leads us to acquire, information directlyand clearly through images. Hence, image security has

 become a critical and imperative issue.

Cryptography is the process of transforminginformation (plain text/Image) into unintelligible form(Cipher text/ Cipher Image).The technology of encryption

is called cryptology. For encryption the RSA algorithm is

used to encrypt and decrypt the text, because it isconsidered as a better solution for data encryption. In

cryptography, RSA is an algorithm for public keycryptography. The RSA algorithm involves the use of twoKeys a public key, which may be known by anybody, and 

can be used to encrypt Messages a private key, known only by the recipient, and used to decrypt messages.

Cryptography defines the art of transforming datainto sequence of bits that appears as random and 

meaningless to a site observer or attacker. It relates to thestudy of mathematical techniques related to the aspects of information security such as confidentiality, data integrity,

entity authentication, data origin authentication. It protectsinformation by transferring it into unreadable form.

The process of sending data along with theacknowledgment is called piggybacking. Piggybacking isdistinct from war driving, which involves only the logging

or mapping of the existence of access points. Piggybackingon Internet access is the practice of establishing a wirelessInternet connection by using another subscriber's

wireless Internet access service without the subscriber'sexplicit permission or knowledge. It is a legally and ethically controversial practice, with laws that vary by

 jurisdiction around the world. While completely outlawed 

or regulated in some places, it is permitted in others.

The paper is organized as follows. In section 2 therelated works are discussed. In section 3 the research

contribution over the encryption and piggybacking arediscussed. In section 4 the results of the evaluated  parameters are discussed. With section 5 the paper isconcluded.

Page 2: Piggy backing technique

7/28/2019 Piggy backing technique

http://slidepdf.com/reader/full/piggy-backing-technique 2/3

 International Journal of Engineering Trends and Technology- Volume3Issue3- 2012

ISSN: 2231-5381 http://www.internationaljournalssrg.org  Page 302

II. RELATED WORK

Alejandroproano and Loukas Lazos in their paper  proposed the methods for the packet hiding in jamming

attacks.T.X.Brown, J.E.James and A.Sethi in their paper  proposed the encryption technique taken place in thewireless networks.

D.Comer, Internetworking with TCP/IP: Principles,

Protocols, and Architecture,Prentice Hall,2006.

O.Goldreich in his proposed paper discusses about

the basic applications of the cryptography and their encryption decryption formulas. G.Lin and G.Noubir intheir paper proposed discusses about the denial of service

attacks and their threats in the Local Area Connected networked. This is referred in the denial of service attack while the piggybacking takes place.

In the Internetworking with TCP/IP: Principles,

Protocols and the architecture by D.Comer the varioustypes of the protocols used, the basic architecture for thecongestion control and piggyback the selected packets are

taken place.

In the paper proposed by M.Cagalj, S.Capkun and 

J.P.Habuax, the wormhole – based congestion technique inthe sensor networks the types of the congestion, theflooding basics the congestion prevention and avoidance

are referred in this work.

In the short paper work proposed by M.Wilhelmand I.Martinovic, J.Schmitt and V.Lenders the “Reactive jamming in the wireless networks: How realistic is thethreat?” the jamming attacks, principles and the selective

 packet hiding techniques are referred.

I.Venkata Saj Manoj in his paper proposed thevarious method and the techniques used in theSteganography and the cryptography.

III. RESEARCH CONTRIBUTION

Piggybacking is well known and extensively used for real – world applications. For large packets such as I,

the source produces a further compressed packet bydiscarding the less- important bits and attaches this small

and redundant packet to data packet i+1.

In this proposed work we propose two newmethodologies to send data between the server and numerous clients in the secure manner. First the dataencryption technique is handled by the RSA Algorithm.Secondly the encrypted text is transfer over the network 

.When the decryption is done on the clients there the piggy backing operation takes place. For packet hiding techniquethe A Strong Hiding Commitment Scheme (SHCS) is

implemented.

3.1 Congestion Control and Packet Classification

One of the major problems in the wirelesscommunication is the congestion control and avoidance

 problem. We, in this proposed paper addressed the problemof discerning congestion attacks in the wireless networks.We considered an internal adversary model which is

responsible for the congestion. In the adversary model, inthat which the congestion is taken place as a part and hence

easily identified and prevented.

The Adversary model proposed here is responsible

for the packet classification in the in real time applications.Once the packet is classified, the adversary is responsibleto choose the technique for jamming avoidance.

Fig -1 The IP Address and the Host Name

Fig -2 The Message to be transmitted.

3.2 A Strong Hiding Commitment Scheme (Shcs)

In this paper, we propose a strong hiding

commitment scheme that is based on the symmetriccryptography method. Main impetus is to satisfy the stronghiding property while keeping the computation and the

communication overhead to a minimum. The proposed SHCS requires the joint consideration of the MAC and PHY layers. To reduce the overhead the de-commitment

value or the decryption key value is done in the same packet in which the encryption is taken place.

A new sub layer is found between the existing twolayers, which is responsible for the packet formatting and 

data hiding. It will form as a frame structure. The purposeof this is to randomize the input to the encryptionalgorithm.

3.3 Encryption of Data

Page 3: Piggy backing technique

7/28/2019 Piggy backing technique

http://slidepdf.com/reader/full/piggy-backing-technique 3/3

 International Journal of Engineering Trends and Technology- Volume3Issue3- 2012

ISSN: 2231-5381 http://www.internationaljournalssrg.org  Page 303

The data is encrypted by using the RSA

Algorithm. It is the public key algorithm that uses the huge prime numbers in their factoring and their multiples as thecode or key to encode the data given. Since the key size is

large the intruders cannot be easily able to hack the data.Through this RSA (Rivest, Shamir, Adleman) algorithmthe data will be more secure.

Fig -3 The User Defined Text is encrypted.

Fig -4 The Data is transmitted to the requested clients.

3.4 Piggybacking Technique

In this paper, we proposed a novelmethod using piggybacking technique of packet loss duringlarge volume of packets sent to more number of clients. At

the decryption end, the data in huge volume will be lossdue to congestions. But by piggybacking the packets alongwith the header and sequence ID and the host name the datawill be send directly to the selected host.

Hence, the data will be buffered and after that

 process the data will be sending to all the clients that arealive on the network. Thus the piggybacking techniques thedata will be directly send to the client network, after the

acknowledgement is received. The TCP protocol isresponsible for the processing.

Fig -5 The Data is transmitted without Packet loss. 

IV. CONCLUSION

In this paper, we propose a new technique for thesecurity of the data by piggyback the data with the

sequence ID and with the host name. Along with the piggybacking we also maintain the strong hiding schemethat provides the packet from loss and stored in the buffer.

The congestion control is maintained in this paper byfollowing the sequential number ID of the packets. In the

wireless network, the confidentiality of the data is moreimportant aspect and is maintained in this paper by piggybacking the packets without loss.

REFERENCES

[1]Alejandroproano and Loukas Lazos, Packet Hiding Methods for 

 preventing Selective Jamming attacks, In: IEEE ICC 2010.

[2]T.X.Brown, J.E.James and A.Sethi , Jamming ans sensing of encrypted 

wireless ad hoc networks . In proceedings of Mobihoc, pages 120-130,

2006.

[3]D.Comer , Internetworking with TCP/IP : Principles, Protocols,and 

Architecture,Prentice Hall,2006.

[4]G.Noubir and G.Lin ,Low –power DoS attacks in data wireless LAN’s

and countermeasures , ACM SIGMOBILE MobileComputing and 

Communications review,7(3):29-30,2003.

[5]O.Goldreich, Foundations of Cryptography: Basic applications,

Cambridge University Press, 2004.

[6]I.Venkata Saj Manoj ,”Cryptography and Steganography”,

International Journal of Computer Applications (0095 – 8887), Volume 1-

 No.

[7]G.Lin and G.Noubir . On link layer Denial of service in data wireless

LANs. Wireless communications and Mobile Computing, 5(3):273-284,

May 2004.

[8]M.Cagalj, S. Capkun, and J.P.Hubaux, Wormhole-based anticongestion

texhniques in sensor networks.IEEE Transactions on Mobile Computing,

6(1):100-114, 2007.

[9]M.Wilhelm, I.Martinovic , J.Schmitt, and V.Lenders. Reactive

Jamming in Wireless Networks: How realistic is the threat? In

 proceddings of Wisec, 2011.

BIOGRAPHY

M.GOWSALYA

Miss.M.GOWSALYA is a Research scholar in theDepartment of Computer Science and Engineering,

Alagappa University, Karaikudi, Tamilnadu, India. She hasreceived her M.Sc in Computer Science from AlagappaUniversity,Karaikudi, Tamilnadu in the year of 2011. She

has presented her work in International and National levelconferences. Her areas of research interests include

network security.

Dr.V.PALANISAMY

Prof. Dr V.PALANISAMY is working as an

Associate Professor in the Department of Computer 

Science and Engineering, Alagappa University,

Karaikukdi, Tamilnadu.