IOSR Journal of Computer Engineering (IOSR-JCE)

Volume 16 ~ Issue 1

Version 1 Version 2 Version 3 Version 4 Version 5 6 7

Paper Type : Research Paper
Title : Cells breaks the Tor''s Anonymity:: Onion Router
Country : India
Authors : Ms. S.Sivaranjani, Ms. R.Backiyalakshmi B.E, M.Tech.,
Abstract: To hide the communication of users, the anonymity systems pack the application data into equal – sized cells. The size of IP packets in the Tor network can be very dynamic and the IP layer may be repack cells. A new cell-counting attack against Tor allows the attacker to confirm anonymous communication relationship among users very quickly. By varying the number of cells in the target traffic at the malicious exit onion router, the attacker can embed a secrete signal into variation of cell counter of the target traffic and it will be carried and arrive at the malicious entry onion router.
[1] W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, "DSSS-based flow marking technique for invisible traceback," in Proc. IEEE S&P,May 2007, pp. 18–32.
[2] N. B. Amir Houmansadr and N. Kiyavash, "RAINBOW: A robust and invisible non-blind watermark for network flows," in Proc.16thNDSS, Feb. 2009, pp. 1–13.
[3] V. Shmatikov and M.-H. Wang, "Timing analysis in low-latency MIX networks: Attacks and defenses," in Proc. ESORICS, 2006, pp. 18–31.
[4] V. Fusenig, E. Staab, U. Sorger, and T. Engel, "Slotted packet counting attacks on anonymity protocols," in Proc. AISC, 2009, pp. 53–60.
[5] X. Wang, S. Chen, and S. Jajodia, "Tracking anonymous peer-to-peer VoIP calls on the internet," in Proc. 12th ACM CCS, Nov. 2005, pp.81–91.
[6] K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker, "Lowresource routing attacks against anonymous systems," Univ. Colorado Boulder, Boulder, CO, Tech. Rep., Aug. 2007.
Paper Type : Research Paper
Title : Real-Time Link-Reliability Routing for QoS in Wireless Sensor Networks
Country : India
Authors : Shiva Prakash T, Raja K B, Venugopal K R, S S Iyengar, L M Patnaik
Abstract: This paper proposes a Real-Time Link Reliability Routing protocol for wireless sensor networks (WSNs). The protocol achieves to reduce packet deadline miss ratio while considering link reliability, two-hop velocity and power efficiency and utilizes memory and computational effective methods for estimating the link metrics. Numerical results provide insights that the protocol has a lower packet deadline miss ratio and improved sensor network lifetime. The results show that the proposed protocol is a feasible solution to the QoS routing problem in wireless sensor networks that support real-time applications..
[1] F. L. Lewis, D. J. Cook, S. K. Dasm and John Wiley. Wireless Sensor Networks, In Proc. Smart Environment Technologies,
Protocols and Applications, New York, 2004, 1-18.
[2] Tian He, John A. Stankovic, Chenyang Lu, and Tarek F. Abdelzaher. A Spatiotemporal Protocol for Wireless Sensor Network, In
IEEE Transactions on Parallel and Distributed Systems, 16(10), 2005, 995-1006.
[3] E. Felemban, C. G. Lee, and E. Ekici. MM-SPEED: Multipath Multi-Speed Protocol for QoS Quarantee of Reliability and
Timeliness in Wireless Sensor Network, In IEEE Transactions on Mobile Computing, 5(6), 2006, 738–754.
[4] O. Chipara, Z. He, G. Xing, Q. Chen, X.Wang, C. Lu, J. Stankovic, and T. Abdelzaher. Real-Time Power-Aware Routing in Sensor
Network, In Proc. IWQoS, 2006, 83–92.
[5] Y. Li, C. S. Chen and Y.-Q. Song, Enhancing Real-Time Delivery In Wireless Sensor Networks With Two-Hop Information. In
IEEE Transactions On Industrial Informatics, 5(2), 2009, 113–122.
[6] J. Stankovic, T. Abdelzaher, C. Lu, L. Sha and J. Hou. Real-time Communication and Coordination in Embedded Sensor Networks,
In Proc. IEEE, 91(7), 2003, 1002–1022.


IOSR Journals are published both in online and print versions.