09-16-2014, 03:20 PM
Tradeoff Between Reliability and Security in
Multiple Access Relay Networks Under
Falsified Data Injection Attack
Multiple Access Relay Networks Under
Falsified Data Injection Attack
We consider a multiple access relay network where multiple sources send independent data to a single destination through multiple relays, which may inject falsified data into the network. To detect the malicious relays and discard (erase) data from them, tracing bits are embedded in the information data at each source node. In addition, parity bits are added to correct the errors caused by fading and noise. When the total amount of redundancy, tracing bits plus parity bits, is fixed, an increase in parity bits to increase the reliability requires a decrease in tracing bits, which leads to a less accurate detection of malicious behavior of relays, and vice versa. We investigate the tradeoff between the tracing bits and the parity bits in minimizing the probability of decoding error and maximizing the throughput in multisource, multirelay networks under falsified data injection attacks. The energy and throughput gains provided by the optimal allocation of redundancy and the tradeoff between reliability and security are analyzed.
Existing System:
Ø The tradeoff between tracing bits and parity bits, where the former is to identify the malicious relay nodes and discard the bits received from them and the latter is to correct the errors caused by channel impairments such as fading and noise.
Ø The energy gain and the throughput gain provided by the optimal redundancy allocation.
Ø Data may not be useful at the destination, It becomes harder for the destination to detect the malicious behavior of the adversary.
Proposed System:
Ø The benefits can extend the coverage, reduce network energy consumption, and promote uniform energy drainage by exploiting neighbors resources.
Ø In multiple access relay networks, relay nodes may combine the symbols received from different sources to generate parity symbols (packets) and send them to the destination.
Ø Traditional system without cooperative communication, its effect is far more serious with cooperative communication.
Ø If a false packet is injected into the buffer of a node, the output of the node will become polluted, and this may soon propagate to the entire network.
Software Requirements:
Platform : JAVA(JDK 1.6)
Front End : JAVA Swing
Back End : MySQL
IDE : Net Beans 6.9
Operating System : Microsoft Windows XP
Hardware Requirements:
Processor : Pentium IV Processor
RAM : 512 MB
Hard Disk : 10GB
Monitor : 14” VGA COLOR MONITOR