UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 3 Issue 12
December-2016
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1701593


Registration ID:
315606

Page Number

1253-1261

Share This Article


Jetir RMS

Title

CEM: CRITICAL EVENT MONITORING FOR HOMOMORPHIC LINEAR AUTHENTICATOR IN PACKET DROPPING ATTACKS

Authors

Abstract

While observing a series of packet losses in the network, critical event monitoring in the network, just a small number of packets need to be sent most of the time. When a crucial event happens, an alert should be sent to the whole network. Some sleep scheduling techniques are constantly used in networks, causing considerable transmission latency, particularly in big networks. A new sleep scheduling technique has to minimize network for alarm broadcasting latency. Design two traffic routes for the delivery of alarm message based wake-up pattern. The insider-attack scenario, where hostile nodes use their knowledge of the communication environment to choose discard a tiny number of packets essential to the network performance, is of particular interest. Because the packet loss rate is similar to the channel error rate, traditional algorithms cannot achieve acceptable detection accuracy. This paper proposed Critical Event Monitoring (CEM) using correlations between missing packets to enhance detection accuracy. Also, to guarantee accurate connections, Develop a public auditing architecture based on homomorphic linear authenticators (HLA) that enables the detector to validate node packet loss information. This design protects privacy, prevents collusion, and saves on communication and storage costs. A packet-block-based method is also suggested to decrease the baseline scheme's processing cost. This paper shows that the suggested mechanisms outperform traditional techniques like maximum-likelihood detection in extended simulations.

Key Words

HLA, CEM, Packet dropping, DoS, Evidence Node

Cite This Article

"CEM: CRITICAL EVENT MONITORING FOR HOMOMORPHIC LINEAR AUTHENTICATOR IN PACKET DROPPING ATTACKS", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.3, Issue 12, page no.1253-1261, December-2016, Available :http://www.jetir.org/papers/JETIR1701593.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"CEM: CRITICAL EVENT MONITORING FOR HOMOMORPHIC LINEAR AUTHENTICATOR IN PACKET DROPPING ATTACKS", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.3, Issue 12, page no. pp1253-1261, December-2016, Available at : http://www.jetir.org/papers/JETIR1701593.pdf

Publication Details

Published Paper ID: JETIR1701593
Registration ID: 315606
Published In: Volume 3 | Issue 12 | Year December-2016
DOI (Digital Object Identifier):
Page No: 1253-1261
Country: Coimbatore, tamilnadu, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000533

Print This Page

Current Call For Paper

Jetir RMS