Efficient and Reliable Transmission Mechanism for Wireless Nodes
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 4
Abstract
In wireless networks the traffic from the source to the destination which is often routed through a number of nodes are often subject to a number of attacks ,where intermediate nodes claim to transmit packets which were no transmitted .These nodes gain higher perferences or priorities the next time they act as the source. In order to tackle such threats a TP is assigned the task of gathering reports and evaluating whether they are genuine or not. This is accomplished in this paper by certain security techniques (hashing, signatures). The reports size are negligible thus large storage spaces are not required. Cheating nodes once detected are barred from the process of transmission. Reports are collected on a periodic basis A good transmission scheme should be secure, and requirelow overhead. However, the existing receipt-based schemes impose significant processing and communication overhead and implementation complexity. Since a trusted party may not be involved in communication sessions, the nodes compose proofs of relaying others’packets, called receipts, and submit them to an offline accounting centre (AC) to clear the payment. The receipts’size is large because they carry security proofs, e.g.,signatures, to secure the payment, which significantly consumes the nodes’ resources and the available bandwidth in submitting them. The AC has to apply a large number of cryptographic operations to verify the receipts, which mayrequire impractical computational power and make the practical implementation of these schemes complex or inefficient. Moreover, since a transaction (relaying packets)value may be very low, the scheme uses micropayment, and thus a transaction’s overhead in terms of submitting and clearing the receipts should be much less than its value.Therefore, reducing the communication and the payment processing overhead is essential for the effective implementation of the payment scheme and to avoid creating a bottleneck at the AC and exhausting the nodes’ resources.
Authors and Affiliations
Feba Grace George , Jaya Varughese , Nithya Mol Antony
Secure Data-Centric Routing Protocols in categorized WSN Using Proficient KDS
Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. In this paper an efficient key distribution s...
Channel Performance Improvement through FF and RBF Neural Network based Equalization
In wireless technology, the communication systems require signal processing techniques to improve the channel performance. The wireless communication is not easily able to avail the error free signal transmission bec...
Highly Secured High Throughput Efficient VLSI Architecture for AES Implementations
The AES algorithm can be implemented in different styles at programming levels. The paper compares the hardware efficiency of different AES implementations with respect to their area, speed and power performance espec...
Blind Watermarking Scheme for Un-Compressed Video Using RBF Neural Network
Robust watermarking is one of the major multimedia processing applications which is specifically important for compressed and uncompressed video for copyright protection, content authentication and broadcasting. In t...
Faults Identification by Passing Test Packets Through Efficient Tool In Network
ATPG comprehends router designs and produces a device autonomous model. The reproduction is utilized to deliver a base arrangement of test packets to negligibly put into impact each connection in the network or maxim...