Synopsis Detailsl for Titles 16- 20

advertisement
www.globalsoftsolutions.in
gsstrichy@gmail.com
PATH RECONSTRUCTION IN DYNAMIC WIRELESS SENSOR
NETWORKS USING COMPRESSIVE SENSING
ABSTRACT
CSPR, a compressive-sensing based approach is proposed for path reconstruction
in wireless sensor networks. By viewing the whole network as a path
representation space, an arbitrary routing path can be represented by a path vector
in the space. As path length is usually much smaller than the network size, such
path vectors are sparse, i.e., the majority of elements are zeros. By encoding sparse
path representation into packets, the path vector can be recovered from a small
amount of packets using compressive sensing technique. CSPR formalizes the
sparse path representation and enables accurate and efficient per-packet path
reconstruction. CSPR is invulnerable to network dynamics and lossy links due to
its distinct design. A set of optimization techniques is further proposed to improve
the design.
www.globalsoftsolutions.in
gsstrichy@gmail.com
INTRODUCTION
The per packet routing path serves as the meta-information for understanding
detailed wireless sensor networks (WSNs) behaviors in many network maintenance
and diagnosis situations, e.g., routing dynamics, detection on routing holes or
wormholes or even per-hop per-packet transmission delay, network diagnosis, etc.
Reconstructing per-packet routing path information, however, has been known to
be nontrivial. WSNs are self-organized and usually deployed in dynamic
environments. The underlying network topology constantly changes, and no fixed
routing path can be expected for each node. A straightforward solution to reveal
the packet path is to record the complete path during packet forwarding, e.g.,
storing the ID sequence of all relay nodes, in each packet. The introduced overhead
linearly grows with the path length, far from scalable.
www.globalsoftsolutions.in
gsstrichy@gmail.com
PROBLEM DEFINITION
There have been many efforts made to address the per-packet path reconstruction
problem in WSNs. The method that identifies packet paths via hash values triggers
disastrous computation overhead. Some methods reconstruct path information by
leveraging interpacket correlation in sufficiently stable and reliable networks.
However, according to our investigation on the practical packet trace from
CitySee, a real-deployed and large-scale WSN, we observe nonnegligible topology
variation and high packet loss all the time. Both topology instability and packet
loss significantly deteriorate existing path reconstruction methods in practical
WSNs.
PROPOSED SOLUTION
Deterioration of existing path reconstruction methods leads to identify the path
reconstruction problem from a new perspective, which requires no interpacket
correlations and thus makes the solution insensitive to network dynamics and lossy
links. The key insight of proposed design is as follows. The length of a routing
path is usually much smaller than the network size. Therefore, we can construct a
path representation space, the number of whose dimensions equals the total
number of nodes in the network. In such a representation space, an arbitrary
routing path can be represented by a path vector, where each element corresponds
to a node in the network. The path vector sets the hop numbers for nodes on the
path and zeros for those not involved in the path. As the path length is much
smaller than the network size, such path vectors are thus sparse, i.e., the majority
of elements are zeros. The path reconstruction becomes a problem of unveiling all
existing path vectors hidden in the representation space. If all nonzero elements of
a path vector can be encoded (with few bytes) into the packets forwarded along the
www.globalsoftsolutions.in
gsstrichy@gmail.com
path, we can recover the path vector based on a small amount of packets using
compressive sensing technique.
www.globalsoftsolutions.in
gsstrichy@gmail.com
EXISTING SYSTEM
 MNT reconstructs per-packet path by exploiting interpacket correlation, i.e.,
a relayed packet and its adjacent packets locally generated at any node are
usually forwarded to the same next hop. Such local packets serve as anchors
of the relayed packet at node i. As the first-hop receiver is recorded in
packets, the path of a packet can be obtained by concatenating the first-hop
receivers of all its anchors.
 Pathfinder tolerates certain inconsistence in interpacket correlation via
explicitly recording inconsistence in packets. The reconstruction failure
occurs once the inconsistence exceeds the tolerance capacity. To accurately
locate anchors, Pathfinder further imposes the packet generation rate of each
node to be identical and fixed.
Sparse Representation of Routing Paths
 Since sensory data in WSNs are usually collected with a direct acyclic graph
(DAG) routing structure. In such a representation space, any routing path
can be presented by a path vector. According to whether a node is involved
in the routing path, the path vector sets either hop number or zero for its
corresponding element.
 As the path length is much smaller than the network size, the path vector is
thus sparse, i.e., the majority of elements in the vector are zeros.
Disadvantages
 Both MNT and Pathfinder require stable network topology such that
interpacket correlation can be captured.
www.globalsoftsolutions.in
gsstrichy@gmail.com
PROPOSED SYSTEM
 To propose a Compressive-Sensing-based Path Reconstruction method,
CSPR, which formalizes the sparse path representation and leverages
compressive sensing to recover routing paths.
 CSPR lets intermediate nodes briefly annotate the transmitted packets and
classifies packets traveling along different paths into different groups.
 For a particular path, the forwarded packets encode independent
observations and CSPR performs compressive sensing to recover the path
when a certain amount of packets is collected.
 In addition to the basic design, a set of optimization techniques is proposed
to gradually shrink the representation space and reduce the sparsity of
unrecovered path vectors.
 The numbers of packets needed for remaining path reconstructions are
lowered, and processing is thus accelerated.
Advantages
 The path reconstruction by CSPR requires no interpacket correlations and
utilizes only a small number of received packets.
 CSPR is thus invulnerable to topology dynamics and lossy links.
 On the protocol level, CSPR introduces only small and fixed overhead in
annotating each packet, which could be optimized accordingly for practical
WSNs.
www.globalsoftsolutions.in
gsstrichy@gmail.com
INTRODUCTION
Path Reconstruction Problem
A WSN consists of a number of sensor nodes and a sink. All sensor nodes generate
and relay packets to the sink. To collect packets, the sink builds a routing structure,
e.g., data collection tree, information potential, etc., covering all the sensor nodes
in the network. After generating one packet, the source node forwards it to its
parent node, and the packet will be further forwarded until it reaches the sink. Due
to the network dynamics, each node will periodically search for the best parent
node. The routing path from each node to the sink thus may change. At the sink, a
path reconstruction method is desired to recover the path each packet traveled. One
packet path is an ID sequence from the source of the packet to the sink, including
IDs of all intermediate nodes relaying this packet and their hop numbers as well.
Compressive-Sensing-Based Path Reconstruction:
For the path vector of a routing path, if its nonzero elements can be encoded into
each packet forwarded along the path, it is viable to recover the vector based on a
small amount of packets using compressive sensing.
www.globalsoftsolutions.in
gsstrichy@gmail.com
1) Accurate Packet Classification: Packet classification into each path group must
be accurate. It is vital to distinguish each individual path and classify the packets
into the right group. Packet misclassification will lead to path reconstruction error
for one group. Therefore, packet classification must have high accuracy.
2) Lightweight Per-Packet Annotation: To enable the compressive-sensing-based
path reconstruction, packets need to carry encoded information for all nonzero
elements of the path vectors representing their traveling paths. In particular, when
one packet is relayed by an intermediate node, the node needs to annotate its hop
number along the path into the packet header. As a result, packet header is updated
hop by hop. The annotation overhead must be small. In particular, the annotation
field in the packet header should be small in size and remain constant. In addition,
updating should be performed in a distributed manner without introducing any
centralized control.
3) Short Per-Packet Path Recovery Delay: To perform compressive- sensing-based
path reconstruction for one path group, the number of packets accumulated in this
group should be at least to ensure a good recovery quality. Some path groups,
however, cannot accumulate sufficient packets even after a long time. As practical
requirement, per-packet path recovery delay should not be excessively long.
www.globalsoftsolutions.in
gsstrichy@gmail.com
HARDWARE REQUIREMENTS
Processor
: Any Processor above 500 MHz.
Ram
: 128Mb.
Hard Disk
: 10 Gb.
Compact Disk
: 650 Mb.
Input device
: Standard Keyboard and Mouse.
Output device
: VGA and High Resolution Monitor.
SOFTWARE SPECIFICATION
Operating System
: Windows Family.
Programming Language : JDK 1.5 or higher
Database
: MySQL 5.0
MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC
NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING
ABSTRACT
File sharing applications in mobile ad hoc networks (MANETs) have attracted
more and more attention in recent years. The efficiency of file querying suffers
from the distinctive properties of such networks including node mobility and
limited communication range and resource. An intuitive method to alleviate
www.globalsoftsolutions.in
gsstrichy@gmail.com
this problem is to create file replicas in the network. However, despite the
efforts on file replication, no research has focused on the global optimal replica
creation with minimum average querying delay. Specifically, current file
replication protocols in mobile ad hoc networks have two shortcomings. First,
they lack a rule to allocate limited resource to different files in order to
minimize the average querying delay. Second, they simply consider storage as
resource for replicas, but neglect the fact that the file holders’ frequency of
meeting other nodes also plays an important role in determining file
availability. Actually, a node that has a higher meeting frequency with others
provides higher availability to its files. This becomes even more evident in
sparsely distributed MANETs, where nodes meet disruptively. A new concept of
resource for file replication is proposed, which considers both node storage and
meeting frequency. Influence of resource allocation is studied on the average
querying delay and derive a resource allocation rule to minimize the average
querying delay. A distributed file replication protocol is proposed to realize the
proposed rule.
www.globalsoftsolutions.in
gsstrichy@gmail.com
INTRODUCTION
With the popularity of mobile devices, i.e., smartphones and laptops, MANET’s
future is envisioned consisted of these mobile devices. By MANETs, both
normal MANETs and disconnected MANETs (or delay tolerant networks (DTNs).
The former has a relatively dense node distribution in a local area while the
latter has sparsely distributed nodes that opportunistically meet each other.
On the other side, the emerging of mobile file sharing applications also
motivates the investigation on the peer-to-peer (P2P) file sharing over such
MANETs. The local P2P model provides three advantages. Firstly, it enables file
sharing when no base stations are available. Secondly, with the P2P
architecture, the bottleneck on overloaded servers in current client-server
based file sharing systems can be avoided. Thirdly, it exploits the otherwise
wasted peer to peer communication opportunities among mobile nodes. As a
result, nodes can freely and unobtrusively access and share files in the
distributed MANET environment, which can possibly support some interesting
applications.
For example, mobile nodes can share files based on users’ proximity in the
same building or a local community. Tourists can share their travel
experiences or emergency information with other tourists through digital
devices directly even when no base station is available in remote areas. Drivers
can share road or weather information through the vehicle-to-vehicle
communication. However, the distinctive properties of MANETs, including node
mobility, limited communication range and resource, have rendered many
difficulties in realizing such a P2P file sharing system. For example, file
searching turns out to be non-trivial and time consuming since nodes in
MANETs move around freely and can exchange information only when they are
within the communication range.
EXISTING SYSTEM
www.globalsoftsolutions.in
gsstrichy@gmail.com
 In existing file replication protocols, each individual node replicates files
it frequently queries, or a group of nodes create one replica for each file
they frequently query.
 Content caching in more sparsely distributed MANETs for efficient data
retrieval or message routing is used. They basically follow an intuitive
way to cache data that are frequently queried on places that are visited
frequently by mobile nodes.
Disadvantages
 In frequent queries based on individual node’s file replication, redundant
replicas are easily created in the system, wasting resources.
 In frequent queries based on group of node’s file replication, though
redundant replicas are reduced by group cooperation, neighboring nodes
may separate from each other due to node mobility, leading to large
query delay.
 Both the two categories file replication and content caching methods fail
to thoroughly consider that a node’s mobility affects the availability of its
files.
 Lack a rule to allocate limited resource to different files for replica
creation in order to achieve the minimum global average querying delay,
i.e., global search efficiency optimization under limited resource.
 Existing system simply considers storage as the resource for replicas, but
neglect that a node’s frequency to meet other nodes also influences the
availability of its files. Files in a node with a higher meeting ability have
higher availability.
PROPOSED SYSTEM
www.globalsoftsolutions.in
gsstrichy@gmail.com
 A new concept of resource for file replication is proposed, which
considers both node storage and node meeting ability.
 To study the influence of resource allocation on the average querying
delay and derive an optimal file replication rule that allocates resources
to each file based on its popularity and size.
Advantages
 The problem of resource allocation for replica creation is done to achieve
global file searching optimization in MANETs.
 To propose a file replication protocol based on the rule, which
approximates the minimum global querying delay in a fully distributed
manner.
www.globalsoftsolutions.in
gsstrichy@gmail.com
HARDWARE REQUIREMENTS
Processor
: Any Processor above 500 MHz.
Ram
: 128Mb.
Hard Disk
: 10 Gb.
Compact Disk
: 650 Mb.
Input device
: Standard Keyboard and Mouse.
Output device
: VGA and High Resolution Monitor.
SOFTWARE SPECIFICATION
Operating System
: Windows Family.
Techniques
: JDK 1.5 or higher
Database
: MySQL 5.0
SECURE AND VERIFIABLE POLICY UPDATE OUTSOURCING FOR
BIG DATA ACCESS CONTROL IN THE CLOUD
ABSTRACT
Due to the high volume and velocity of big data, it is an effective option to store
big data in the cloud, as the cloud has capabilities of storing big data and
processing high volume of user access requests. Attribute-Based Encryption (ABE)
www.globalsoftsolutions.in
gsstrichy@gmail.com
is a promising technique to ensure the end-to-end security of big data in the cloud.
However, the policy updating has always been a challenging issue when ABE is
used to construct access control schemes. A trivial implementation is to let data
owners retrieve the data and re-encrypt it under the new access policy, and then
send it back to the cloud. This method, however, incurs a high communication
overhead and heavy computation burden on data owners. A novel scheme is
proposed that enable efficient access control with dynamic policy updating for big
data in the cloud. Developing an outsourced policy updating method for ABE
systems is focused. This method can avoid the transmission of encrypted data and
minimize the computation work of data owners, by making use of the previously
encrypted data with old access policies. Policy updating algorithms is proposed for
different types of access policies. An efficient and secure method is proposed that
allows data owner to check whether the cloud server has updated the ciphertexts
correctly. The analysis shows that this policy updating outsourcing scheme is
correct, complete, secure and efficient.
INTRODUCTION
Big data refers to high volume, high velocity, and/or high variety information
assets that require new forms of processing to enable enhanced decision making,
insight discovery and process optimization. Due to its high volume and
complexity, it becomes difficult to process big data using on-hand database
management tools. An effective option is to store big data in the cloud, as the cloud
has capabilities of storing big data and processing high volume of user access
requests in an efficient way. When hosting big data into the cloud, the data security
becomes a major concern as cloud servers cannot be fully trusted by data owners.
www.globalsoftsolutions.in
gsstrichy@gmail.com
PROBLEM DEFINITION
The policy updating is a difficult issue in attribute-based access control systems,
because once the data owner outsourced data into the cloud, it would not keep a
copy in local systems. When the data owner wants to change the access policy, it
has to transfer the data back to the local site from the cloud, reencrypt the data
under the new access policy, and then move it back to the cloud server. By doing
so, it incurs a high communication overhead and heavy computation burden on
data owners. This motivates us to develop a new method to outsource the task of
policy updating to cloud server.
The grand challenge of outsourcing policy updating to the cloud is to guarantee the
following requirements:
1) Correctness: Users who possess sufficient attributes should still be able to
decrypt the data encrypted under new access policy by running the original
decryption algorithm.
2) Completeness: The policy updating method should be able to update any type of
access policy.
3) Security: The policy updating should not break the security of the access control
system or introduce any new security problems.
www.globalsoftsolutions.in
gsstrichy@gmail.com
EXISTING SYSTEM
 Attribute-Based Encryption (ABE) has emerged as a promising technique to
ensure the end-to-end data security in cloud storage system. It allows data
owners to define access policies and encrypt the data under the policies, such
that only users whose attributes satisfying these access policies can decrypt
the data.
 The policy updating problem has been discussed in key policy structure and
ciphertext-policy structure.
Disadvantages
 When more and more organizations and enterprises outsource data into the
cloud, the policy updating becomes a significant issue as data access policies
may be changed dynamically and frequently by data owners. However, this
policy updating issue has not been considered in existing attribute-based
access control schemes.
 Key policy structure and ciphertext-policy structure cannot satisfy the
completeness requirement, because they can only delegate key/ciphertext
with a new access policy that should be more restrictive than the previous
policy.
 Furthermore, they cannot satisfy the security requirement either.
www.globalsoftsolutions.in
gsstrichy@gmail.com
PROPOSED SYSTEM
 Focus on solving the policy updating problem in ABE systems, and propose
a secure and verifiable policy updating outsourcing method.
 Instead of retrieving and re-encrypting the data, data owners only send
policy updating queries to cloud server, and let cloud server update the
policies of encrypted data directly, which means that cloud server does not
need to decrypt the data before/during the policy updating.
 To formulate the policy updating problem in ABE sytems and develop a new
method to outsource the policy updating to the server.
 To propose an expressive and efficient data access control scheme for big
data, which enables efficient dynamic policy updating.
 To design policy updating algorithms for different types of access policies,
e.g., Boolean Formulas, LSSS Structure and Access Tree.
 To propose an efficient and secure policy checking method that enables data
owners to check whether the ciphertexts have been updated correctly by
cloud server.
www.globalsoftsolutions.in
gsstrichy@gmail.com
Advantages
 This scheme can not only satisfy all the above requirements, but also avoid
the transfer of encrypted data back and forth and minimize the computation
work of data owners by making full use of the previously encrypted data
under old access policies in the cloud.
 This method does not require any help of data users, and data owners can
check the correctness of the ciphertext updating by their own secret keys and
checking keys issued by each authority.
 This method can also guarantee data owners cannot use their secret keys to
decrypt any ciphertexts encrypted by other data owners, although their secret
keys contain the components associated with all the attributes.
www.globalsoftsolutions.in
gsstrichy@gmail.com
LITERATURE SUMMARY
Attribute-based encryption (ABE)
ABE technique is regarded as one of the most suitable technologies for data access
control in cloud storage systems.
There are two complementary forms of ABE
Key-Policy ABE (KP-ABE)
In KPABE, attributes are used to describe the encrypted data and access policies
over these attributes are built into user’s secret keys
Ciphertext-Policy ABE (CP-ABE)
In CP-ABE, attributes are used to describe the user’s attributes and the access
policies over these attributes are attached to the encrypted data.
Recently, some attribute-based access control schemes were proposed to ensure the
data confidentiality in the cloud. It allows data owners to define an access structure
on attributes and encrypt the data under this access structure, such that data owners
can define the attributes that the user needs to possess in order to decrypt the
ciphertext.
However, the policy updating becomes a difficult issue when applying ABE
methods to construct access control schemes, because once data owner outsource
the data into cloud, they won’t store in local systems.
To change the access policies of encrypted data in the cloud, a trivial method is to
let data owners retrieve the data and re-encrypt it under the new access policy, and
then send it back to the cloud server.
www.globalsoftsolutions.in
gsstrichy@gmail.com
But this method will incur a high communication overhead and heavy computation
burden on data owners.
Key-Policy Attribute-Based Encryption
This method discussed on how to change the policies on keys. Authors also
proposed a ciphertext delegation method to update the policy of ciphertext.
However, these methods cannot satisfy the completeness requirement, because
they can only delegate key/ciphertext with a new access policy which is more
restrictive than the previous policy.
They cannot satisfy the security requirement either.
www.globalsoftsolutions.in
gsstrichy@gmail.com
HARDWARE REQUIREMENTS
Processor
: Any Processor above 500 MHz.
Ram
: 128Mb.
Hard Disk
: 10 Gb.
Compact Disk
: 650 Mb.
Input device
: Standard Keyboard and Mouse.
Output device
: VGA and High Resolution Monitor.
SOFTWARE SPECIFICATION
Operating System
: Windows Family.
Techniques
: JDK 1.5 or higher
Database
: MySQL 5.0
A PRIVACY-PRESERVING FRAMEWORK FOR MANAGING MOBILE
AD REQUESTS AND BILLING INFORMATION
www.globalsoftsolutions.in
gsstrichy@gmail.com
www.globalsoftsolutions.in
gsstrichy@gmail.com
ABSTRACT
Organizations are starting to realize the significant value of advertising on mobile
devices, and a number of systems have been developed to exploit this opportunity.
From a privacy perspective, practically all systems developed so far are based
either on a trusted third-party model or on a generalized architecture. A system
proposed
for
delivering
context,
location,
time,
and
preference-aware
advertisements to mobiles with a novel architecture to preserve privacy. The main
adversary in this model is the server distributing the ads, which is trying to identify
users and track them, and to a lesser extent, other peers in the wireless network.
When a node is interested in an ad, it forms a group of nearby nodes seeking ads
and willing to cooperate to achieve privacy. Peers combine their interests using a
shuffling mechanism in an ad-hoc network and send them through a primary peer
to the ad-server. In this way, preferences are masqueraded to request custom ads,
which are then distributed by the primary peer. Another mechanism is proposed to
implement the billing process without disclosing user identities.
www.globalsoftsolutions.in
gsstrichy@gmail.com
INTRODUCTION
Whether it is TV, radio, newspapers, or the Internet, advertisements generate
substantial revenues. And, as mobile devices get more involved as media delivery
platforms, the worth of advertising on these devices becomes significant. With
billions of mobile users worldwide, it is indeed a potentially huge market for
advertising. Moreover, considering that a decent fraction of these users own
smartphones or tablets certainly expands this opportunity. These users spend
significant time browsing the different multimedia and gaming capabilities of their
devices, making them more exposed to ads. Also, these devices now come with
Wi-Fi and 3G, meaning they can be reached virtually everywhere. Add to this GPS
capability and computing user preferences, and a new level of targeted advertising
can be attained.
www.globalsoftsolutions.in
gsstrichy@gmail.com
PROBLEM STATEMENT
Personalized ads that can match users’ preferences with products and services in
their vicinities have much higher chances of succeeding in capturing these users’
attention and achieving better customer satisfaction, consequently increasing the
profitability of ads.
The same aspects that make these devices great platforms for advertising also
impose strict guidelines since they contain key private data, like contacts
information and calendar entries. Hence, proper use and confidentiality of this data
should be respected.
www.globalsoftsolutions.in
gsstrichy@gmail.com
EXISTING SYSTEM
 Mix networks use a chain of proxy servers in the routing protocol in order to
make the tracing of communications harder. The protocol shuffles the
messages received from multiple senders and sends them out to the next
destination in a random order.
 Mixes are most effective when placed in series, like forwarding nodes in
mobile ad hoc networks (MANETs), and require constant sized flowing
traffic to avoid identifying those nodes that transmit data, and thus preserve
anonymity.
 A related technique is Onion routing that calls for repeatedly encrypting
messages and sending them through network nodes, called onion routers.
 Like peeling an onion, each router removes a layer of encryption to uncover
routing instructions, and sends the message to the next router where this is
repeated.
www.globalsoftsolutions.in
gsstrichy@gmail.com
Disadvantages
 Even though some are classified as real-time mixes, the majority use
asymmetric cryptographic systems, where at the routing level they encrypt,
or decrypt then encrypt, and then reroute, which is known to introduce large
overhead.
 Some of the proposed protocols, like ZAP, do not provide communication
anonymity, while ASR uses only asymmetric cryptosystems. Many of the
approaches proposed for ad-hoc networks, implicitly assume a trusted
network operator and involve multiparty components for computing
cryptography keys and functions.
 There are several weaknesses that are associated with the proposed mix
protocols in the literature. Timing analysis is one of them, where an
adversary might know if a node is communicating with a server by
correlating when messages are sent by a server and when messages are
received by the node.
www.globalsoftsolutions.in
gsstrichy@gmail.com
PROPOSED SYSTEM
 To propose a system for delivering user or application requested ads,
tailored to match users’ preferences whilst preserving their privacy and
taking into consideration context, time, and location.
 This is done by aggregating requests and sending them through one of the
users, who later anonymously contacts the server with the list of aggregated
interests. After receiving the ads, the designated user distributes them to the
users in the same way they were collected, through an ad-hoc connection.
 Billing reports of clicks ads are managed much in the same manner, and
piggybacked on requests for ads.
 This prohibits the server distributing the ads from identifying users or
associating them with preferences, times, and locations.
www.globalsoftsolutions.in
gsstrichy@gmail.com
Advantages
 A simpler overall system that allows peers to send requests any time, and
does not require them to back-off for a certain time after becoming primary.
 An extended fairness method that makes fairness in the system long-lived,
i.e., widespread among all peers, and not temporary where it only applies to
peers in the same group.
 A new billing system that does not rely on a trusted third party model
(server).
 A more robust shuffling technique with multiple encryption levels that
greatly increases privacy.
 An aggregation scheme that retains privacy even when the number of peers
in the group is small.
 A new caching system that stores not only application requests but also
specific requested ads.
 Algorithms that make the system more resilient to malicious attempts to
breach user privacy.
 Mobile advertising relies on content providers like applications and
webpages to deliver ads to users. Service providers register ads to an adserver, which delivers them to users through content providers who usually
subscribe to host ads for profit making.
 When a user accesses an application subscribed to an ad-server, the
application requests an ad from the server with the user location and id.
www.globalsoftsolutions.in
gsstrichy@gmail.com
 The server then checks based on the id the interests of the user through an
online profile, and delivers targeted ads that refer to service providers in the
vicinity of the user which are relevant to his interests.
 After the user clicks the delivered ad, a click report is sent to the ad-server
for billing purposes.
 Ad server has the ability to track users even if it declares that such
information is not being stored, knowing that most ad-providers
acknowledge that they store such information.
 The ad-server has access to all the users’ personal information including
their interests and location info, and thus it can easily profile users. Even
though such privacy invasion of user personal information is currently
regulated by the industry, several users decide not to opt-in because of
privacy concerns. Thus, implementing a privacy preserving architecture will
ensure a greater extent of penetration of targeted advertising.
www.globalsoftsolutions.in
gsstrichy@gmail.com
LITERATURE SUMMARY
MobiAd
MobiAd sends ads target users geographically based on their interests. The user’s
profile is kept local and isolated from other applications and from the server.
Billing is addressed by the architecture through click reports that contain the
pseudorandom IDs of the ads, and are aggregated and sent through delay tolerant
networks toward the ad provider.
Drawbacks
This work though does not specify important details like the frequency of
broadcasts which might not be available when users actually require ads. It also
suggests that users cache ads, but this will not work for localized ads since users’
locations could change. Also, ads are pre-fetched and stored locally, the
broadcasted ads may not necessarily match the interests of all users in the vicinity.
MoMa-system
MoMa-system was introduced as a mobile marketing platform, and was compared
to another advertising system. A request for an ad containing the user’s references
to his profiles is sent to an anonymizer, a trustworthy party, and saved in its
database. The anonymizer encrypts the private user data and sends the request to a
server, thus obscuring the original IP where the request came from. In turn, the
server sends the user the specific ads.
Drawbacks
MoMa does not specify a billing scheme.
www.globalsoftsolutions.in
gsstrichy@gmail.com
BlueMall
BlueMall is presented for mobile advertising in a mall, based on a hybrid system of
a wired core network and a wireless edge network (Bluetooth). When an access
point detects a mobile user with activated Bluetooth, it checks its database for
previous interactions and stored frequent zones to provide related advertising.
BlueMall keeps track of the ads the users are receiving to avoid spamming them
and allows them to opt out from this service by deactivating their Bluetooth
connection.
Drawbacks
The model however does not account for privacy concerns, since the database
contains all necessary information to profile users and track them, as it stores
users’ visits, frequent zones, and mobility behaviors.
B-MAD
B-MAD is another system, which relies on proximity to known Bluetooth devices
to determine the user’s location. In a typical scenario, the devices would report the
location and Bluetooth address of a user to the ad server which tries to recognize
him and send location-based ads through service messages. The user can see the ad
by clicking on the URL in the message after reading its description.
Drawbacks
This system has problems like inaccurate determined locations, large time delays,
substantial privacy and security issues, and non-personalized advertising.
www.globalsoftsolutions.in
gsstrichy@gmail.com
Google’s AdMob and Apple’s iAd
Google’s AdMob and Apple’s iAd are the most popular applications that deliver
targeted advertising on mobile devices. To deliver ads that are of interest to users,
AdMob collects information such as session information, browser cookies, device
type, carrier provider, IP addresses, device ID, carrier user ID, geo-location
information, sites visited, and clicks on advertisements. In a very similar way, iAd
delivers interest related advertisements by using cookies and other technologies in
mobile advertising services.
Drawbacks
Obviously, both Google and Apple are storing data and interests that identify each
individual, and hence user privacy may be compromised.
AdDroid
AdDroid is proposed as a tool to separate the privilege given to advertisers in
Android from the application requesting the ads. Based on the notion that a great
percentage of applications are granted the privilege of accessing the user’s
preferences due to ads, AdDroid introduces an API with advertisement permissions
for Android as an intermediary party that supplies the user’s preferences to the
advertising networks. The application provides the API with specific data to
identify which network to fetch data from, and hence it will not be granted the
privilege to access the user’s preferences.
Drawbacks
This system increases privacy, but it still grants the advertising network full access
to the user’s personal interests.
www.globalsoftsolutions.in
gsstrichy@gmail.com
HARDWARE REQUIREMENTS
Processor
: Any Processor above 500 MHz.
Ram
: 128Mb.
Hard Disk
: 10 Gb.
Compact Disk
: 650 Mb.
Input device
: Standard Keyboard and Mouse.
Output device
: VGA and High Resolution Monitor.
SOFTWARE SPECIFICATION
Operating System
: Windows Family.
Techniques
: JDK 1.5 or higher
Database
: MySQL 5.0
Defending Against Collaborative Attacks by Malicious Nodes in
MANETs: A Cooperative Bait Detection Approach
In mobile ad hoc networks (MANETs), a primary requirement for the
establishment of communication among nodes is that nodes should cooperate
with each other. In the presence of malevolent nodes, this requirement may
www.globalsoftsolutions.in
gsstrichy@gmail.com
lead to serious security concerns; for instance, such nodes may disrupt the
routing process. In this context, preventing or detecting malicious nodes
launching grayhole or collaborative blackhole attacks is a challenge. This
paper attempts to resolve this issue by designing a dynamic source routing
(DSR)-based routing mechanism, which is referred to as the cooperative bait
detection scheme (CBDS), that integrates the advantages of both proactive
and reactive defense architectures. Our CBDS method implements a reverse
tracing technique to help in achieving the stated goal. Simulation results are
provided, showing that in the presence of malicious-node attacks, the CBDS
outperforms the DSR, 2ACK, and best-effort fault-tolerant routing (BFTR)
protocols (chosen as benchmarks) in terms of packet delivery ratio and
routing overhead (chosen as performance metrics).
EXISTING
SYSTEM
* Detection mechanisms that have been proposed so far can be grouped into
two
broad
categories.
Proactive
detection
schemes
*
Schemes that need to constantly detect or monitor nearby nodes.
* Regardless of the existence of malicious nodes, the overhead of detection
is constantly created, and the resource used for detection is constantly
wasted.
* One of the advantages of these types of schemes is that it can help in
preventing
or
avoiding
an
attack
in
its
initial
stage.
* Liu et al. proposed a 2ACK scheme for the detection of routing misbehavior
in MANETs. In this scheme, two-hop acknowledgement packets are sent in
the opposite direction of the routing path to indicate that the data packets
have been successfully received. A parameter acknowledgment ratio, i.e.,
Rack, is also used to control the ratio of the received data packets for which
the acknowledgment is required. This scheme belongs to the class of
proactive schemes and, hence, produces additional routing overhead
regardless of the existence of malicious nodes.
Reactive
detection
* Schemes are those that trigger only when the destination node detects a
significant
drop
in
the
packet
delivery
ratio.
* Xue and Nahrstedt proposed a prevention mechanism called best-effort
fault-tolerant routing (BFTR). Their BFTR scheme uses end-to-end
acknowledgements to monitor the quality of the routing path to be chosen by
the destination node. If the behavior of the path deviates from a predefined
behavior set for determining “good” routes, the source node uses a new route.
www.globalsoftsolutions.in
gsstrichy@gmail.com
Disadvantages
* Existing solutions deal with the detection of a single malicious node or
require enormous resource in terms of time and cost for detecting cooperative
blackhole
attacks.
* Existing methods require specific environments or assumptions in order to
operate.
* Under BFTR scheme, malicious nodes may still exist in the new chosen
route, and this scheme is prone to repeated route discovery processes, which
may lead to significant routing overhead.
PROPOSED
SYSTEM
* To propose a detection scheme called the cooperative bait detection
scheme (CBDS), which aims at detecting and preventing malicious nodes
launching
grayhole/collaborative
blackhole
attacks
in
MANETs.
* The source node stochastically selects an adjacent node with which to
cooperate, in the sense that the address of this node is used as bait
destination address to bait malicious nodes to send a reply RREP message.
* Malicious nodes are thereby detected and prevented from participating in
the
routing
operation,
using
a
reverse
tracing
technique.
*
CBDS
is
DSR-based.
* As such, it can identify all the addresses of nodes in the selected routing
path from a source to destination after the source has received the RREP
message.
ADVANTAGES
* Proposed detection scheme takes advantage of the characteristics of both
the reactive and proactive schemes to design a DSR-based routing scheme
able to detect grayhole/ collaborative blackhole attacks in MANETs
Download