Integrity And Confidentiality for Network Security

Abstract

We compute the liability metric as a function of the steering and the cryptographic protocols used to secure the complex passage. We formulate the minimum cost node capture attack problem as a nonlinear integer programming problem. The steering protocols in the wireless complex disclose the fact that refuge and steering cannot be established dually. Investigation is done on the impact of node capture attacks on the confidentiality and integrity of complex passage. I develop a method called GNAVE (Greedy Node capture Approximation using Liability Evaluation) to maximize the liability resulting from the capture of each individual nodes using the information required form the previously captured node which dually provides the refuge using RVM (Route Liability Metric) method which quantifies the effective refuge of passage traversing for a given node as well as the optimized steering using set theoretic scrutiny. The liability is measured using steering and cryptographic protocols for the scrutiny of weakness in every node and provides secured complex passage. The minimum cost node capture attack is appraised at every point of time. Using the known parameters like bandwidth, channel capacity, mobility speed the adverse effects can be analyzed. Enter management facility is embedded as a part of this project. A enter management scheme is designed which satisfy the refuge requirements by selectively distributing the enters to the nodes without overhead of computations or bandwidth usage. We investigate the impact of node capture attacks on the confidentiality and integrity of complex passage. Heuristic that approximates the minimum cost attack. We provide examples of node capture attacks using our liability.

Authors and Affiliations

B. Saujanya Rani, U Ch Prasad

Keywords

Related Articles

Indoor positioning and Navigation using Light sensor

Indoor positioning systems now a days got an extensive popularity. These systems have been successfully used in many applications such as asset tracking and inventory management. In this work we describes a novel lig...

Real Time Traffic Density And Vehicle Count Using Image Processing Technique

Monitoring Indian trafic and calculation of peak hours and density count in a day helps to develop necessary travel and traffic volume estimates, required to satisfy the needs in the are of road planning, constructio...

Efficient Anonymity Profile Comparison Techniques To Filter Unwanted Messages From OSN User Walls

Social networking creates digital communication technologieshone tools for make bigger the social ring of people.It has by nowturned intoasignificant integral part of our dailylives;allow us to contact our friends an...

Evaluation of A Prototype ATPG System Using Rulesets From The Stanford And Internet2 Backbones

The most important sources of transparency for ATPG (Automatic Test Packet Generation) are polling the network periodically for forwarding state and performing all pair’s reachability. First we have freshly speeded u...

A Framework for Administration Assault Recognition in Multivariate Connection Exploration

Denial of-Service (DoS) attacks are a basic danger to the Internet. It is extremely arduous to follow back the assailants for the reason that of memory less element of the web directing components. Subsequently, ther...

Download PDF file
  • EP ID EP27723
  • DOI -
  • Views 264
  • Downloads 3

How To Cite

B. Saujanya Rani, U Ch Prasad (2013). Integrity And Confidentiality for Network Security. International Journal of Research in Computer and Communication Technology, 2(11), -. https://europub.co.uk/articles/-A-27723