CFP last date
22 April 2024
Reseach Article

Entropy Trust based Approach against IP Spoofing Attacks in Network

by Sovan Bhattacharya, Arnab Ghosh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 23
Year of Publication: 2013
Authors: Sovan Bhattacharya, Arnab Ghosh
10.5120/11537-7340

Sovan Bhattacharya, Arnab Ghosh . Entropy Trust based Approach against IP Spoofing Attacks in Network. International Journal of Computer Applications. 67, 23 ( April 2013), 27-32. DOI=10.5120/11537-7340

@article{ 10.5120/11537-7340,
author = { Sovan Bhattacharya, Arnab Ghosh },
title = { Entropy Trust based Approach against IP Spoofing Attacks in Network },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 23 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 27-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number23/11537-7340/ },
doi = { 10.5120/11537-7340 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:15.570952+05:30
%A Sovan Bhattacharya
%A Arnab Ghosh
%T Entropy Trust based Approach against IP Spoofing Attacks in Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 23
%P 27-32
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Designing and architecture of Trust model in WSN is now a days research challenge. Trust is important in wireless networks because collaboration and cooperation among nodes and critical towards achieving the system's goals, such as routing reliability. IP-spoofing attacks remain one of the most damaging attacks in which a router replaces the original source IP-address by a new one. This paper present a novel approach using Entropy inference model that evaluates the trustworthiness of an access router and distributed router with regards to forwarding packets. The trust values for the Group router is computed by a judge router that samples all traffic being forwarded by the access router. The trust values for the access router and distributed router are computed by distributed router and ingress/egress router respectively. The simulation results to detects malicious access routers and malicious distributed routers.

References
  1. Gonzalez, J. , Anwar M. , Joshi, J. , "A trust-based approach against IP-Spoofing attacks," 9th Annual Conf. on Privacy. Trust and Security, Montreal 2011.
  2. Gonzalez, J. , Anwar M. , Joshi, J. , "Trust-based approaches to solve Routing Issues in Ad-hoc wireless Networks: A Survey," International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11, Montreal 2011.
  3. Wenzhong, Y. , Cuanhe, H. , Bo, W. , Tong, W. , Zhenyu, Z. , "A General Trust Model Based on Trust Algebra," Int. conf. in Multimedia Inf. Networking and Security. , vol. 1, pp. 125-129, 18-20 Nov. 2009.
  4. Wang Yonghong, Singh Munindar P. , "Formal Trust Model for Multiagent Systems," National Science Foundation under grant ITR-0081742, IJCAI-07 1551-1556.
  5. Mahmoud Mohamed Elsalih, Shen Xuemin (Sherman), "Trust-Based and Energy-Aware Incentive Routing Protocol for Multi-hop Wireless Networks," IEEE, 978-1-61284-233-2/11, 2011 .
  6. Probst, M. J. , Kasera, S. K. , "Statistical trust establishment in wireless sensor networks," Int. Conf on Parallel and Distributed Systems, vol. 2, pp. 1-8, 5-7 Dec. 2007.
  7. Nasser Nidal, Chen Yunfeng, "Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad hoc Networks," IEEE, 1-4244-0353-7/07, 2007.
  8. Raha Arnab, Babu Shaik Sahil, Naskar Kanti Mrinal, Alfandi Omar, Hogrefe Dieter, "Trust Integrated Link State Routing Protocol for Wireless Sensor Networks (TILSRP),".
  9. Karthik. N, Sarma Dhulipala. R. V, "TRUST CALCULATION IN WIRELESS SENSOR NETWORKS," IEEE, 978-1-4244-8679-3/11, 2011.
  10. Peng Shih-Hao, Chang Kai-Di, Chen Jiann-Liang, Lin I-Long, and Chao Han-Chieh, "A Probabilistic Packet Marking scheme with LT Code for IP Traceback," International Journal of Future Computer and Communication, Vol. 1, No. 1, June 2012.
  11. Sun, Y. , Yu, W. , Han, Z. , Liu, K. , "Information theoretic framework of trust modeling and evaluation for ad hoc networks," Selected Areas in Commun. , IEEE J. , vol. 24, pp. 305-317, Feb. 2006.
  12. Zhong, S. , Chen, J. , Yang, Y. R, "Sprite: a simple cheat-proof, credit-based system for mobile ad-hoc networks, " 22nd Annual Joint Conf. of the IEEE Computer and Communications, vol. 3, pp. 1987-1997 vol. 3, 30 March-3 April 2003.
  13. Carl, G. , Kesidis, G. , Brooks, R. R. , and Suresh R. , "Denial-of-service attack-detection techniques," Internet Computing, IEEE, vol. 10, no. 1, pp. 82- 89, Jan. -Feb. 2006
  14. Hu, Y. , Choi, H. , Choi, H. , "Packet filtering for congestion control under DoS attacks," Information Assurance Workshop, 2004. Proceedings. Second IEEE International, pp. 3- 18, 8-9 April 2004
  15. "S. Ganeriwal and M. B. Srivastava. Reputation-Based Framework for High Integrity Sensor Networks. In 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. , pages 66–77, Washington, DC, USA, 2004. "
  16. Theodorakopoulos, G. , Baras, J. S. , "On trust models and trust evaluation metrics for ad hoc networks," Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 318- 328, Feb. 2006
  17. Nguyen, C. , Camp, O. , Loiseau, S. , "A Bayesian network based trust model for improving collaboration in mobile ad hoc networks," Research, Innovation and Vision for the Future, 2007 IEEE International Conference on, pp. 144-151, 5-9 March 2007
Index Terms

Computer Science
Information Sciences

Keywords

Trust IP-spoofing Group Routing System Access Router Distributed Router Entropy Inference