Cryptographic Approach of Generic Caching strategy for Opportunistic Wireless Networks (OPPNETS)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: In Opportunistic networks, if a mobile finds that the content of its interest is available in other mobiles, it will send a message to request for the content and download it. The term subscriber denotes a node which requests for the content and the term publisher denotes a node which has the content. There can be two types of caches in a mobile node, namely private and public caches. Private cache stores the data of its own interest where as public cache stores the data of other nodes’ interests. While a subscriber node requests another node for a particular content that is in the communication range for which it is missing, thereafter it forwards the request to other neighbouring nodes. In the case of public cache, there may be an intruder who issues false requests on behalf of a subscriber thereafter may get the access of the publisher’s device and tries to keep the device busy always and unavailable. Thus it achieves the denial of service (DOS) attack. In this paper I investigate the various attacks that aim to degrade the public caching capabilities and propose a special kind of caching scheme called a Signature Generic Cache which stores the public data contents with the digital signature. Here digital signature is formed by taking the hash of the data content andthen encrypting the data one by one with the publisher’s private key whose purpose is to guarantee the integrity of the cached content. In one-way authentication, the publisher assures that the request is from the trusted user by validating the requester’s digital certificate and thus it avoids security vulnerabilities. In order to conduct my study, I evaluate the performance of Signature generic caching scheme by using OMNET++ simulator. In this paper, I present the results by adopting the latest version of INET framework to implement the concept of Oppnets and NETA framework in order to show the various network attacks which are built on the top of OMNET++.
Authors and Affiliations
L. Jai Vinita
Detection and Prevention of Wormhole Attack in MANET UsingDSR Protocol
Abstract: With the advancement in wireless technologies, wireless networks are developing at a fast rate andso are the MANET’s. Several routing attacks are introduced in the wireless networks due to their dynamical...
Leveraging Map Reduce With Hadoop for Weather DataAnalytics
Abstract : Collecting, storing and processing of huge amounts of climatic data is necessary for accurateprediction of weather. Meteorological departments use different types of sensors such as temperature, humidity...
The Impacts Of Information And Communication Technology (ICT) On The Teaching And Learning Science And Mathematics For Sustainable Development
Information and Communication Technology (ICT) is relatively a new area in human development that combines the technology of various electronic devices. The use of them and the distribution of these facilities with...
Optimal Planning of the Production of Corpus Details on Metal Cutting Machines with the Help of Computer Numeric Control
Abstract: The optimal planning of details mechanical processing is a key problem, directly affecting the productivity and efficiency of the activity of a machine building company. The combinatorial character of the prob...
Futureof Air Traffic Management Networks Using Fiber and Vsat Technologies
Abstract: As air traffic increases, routes get more diverse and light and ultra-light aircraft are becoming most popular. The main issues regarding classic radio communications are delay , availability and reliability of...