Mitigating Packet Classification for Header Information Retrieval in Wireless Network
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 12, Issue 8
Abstract
Although encryption is used to protect data from being read by unintended recipients it still does not ensure complete safeness. The reason being that information can be gathered by an eavesdropper by indirect inferences like packet classification and traffic analysis. Thus our aim is to protect the header from being read by selective insider jammers. In such a scenario where we have a selective insider jammer who is active only for a period of time, protecting the header information should be given higher priority as these adversaries classify the packets using first few bits from the header fields and add bit errors to the packet if it is an important one. Header information can be protected using modified anonymous routing scheme where we employ multiple level of encryption of the packet to prevent the adversary from classifying the packet using the header information.
Authors and Affiliations
LEKSHMI MR, Prof. N. Nityanandam
EVOLVING INFORMATION TECHNOLOGY: OPPORTUNITIES AND CHALLENGES
The rapid Information technology evolution is fast becoming a change agent in the ways we conduct business and social interaction. Due to the increasing number of regulations and policies regarding information technology...
An Environment for detection of Bugs through SVM
Mining technique finds hidden patterns from the data stored in the repositories and turn it into useful information and knowledge. Most open source software development projects include an open bug repository in which us...
Representation of cloud ecosystem using engineering methodologies
Cloud Computing has fascinated massive consideration for business in spite of lot of technologies and business models in the market. The operational particulars within the cloud are not coherent enough to customers. Henc...
Implementation of Watershed Based Image Segmentation Algorithm using Distance Transform for Grid Computing
A new method for image segmentation using watershed transform algorithm is presented in this paper. It takes advantage of the fact that the proposed algorithm produced good results even if the same parameters are used fo...
Application Of Signed Graph In Decision Making
A signed graph may be defined as an ordered pair (G, σ) where G= (V, E) is the graph and σ is a function called signature or sign mapping from E to the sign group {+, -}. People or friends are considered as the vertice...