A Secure Cryptographic Puzzle based Approach Ensuring TotalSecurity for transmitted Information with IP Tracing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Today internet is extremely affected by several attacks such as Denial-of-Service attacks. The source IP address in a packet can be falsified. Thus IP Protocol fails to determine the originator. The attacker performs IP Spoofing and creates attacks. Thus for determining the real source of the attacker several IP Traceback schemes come forward. The available schemes have their own advantages and disadvantages. Computational Complexity is considered as common drawback. With the aim of overcoming the drawback an IP Traceback Digital Signature Algorithm is used for ensuring security for the transmitted data using Socketcommunication As all the available methodologies for IP Traceback, the current approach also focuses only on tracing attacker. With the aim of ensuring a Total security, a Cryptographic puzzle based scheme is also incorporated along with the new approach for preventing Hackers. Here certain puzzles are also used for encrypting the message along with the available methodology. Here the opponent cannot solve the puzzle until the encrypted packet reaches the destination. . The scheme is implemented based on a share market based application. The security of the scheme is also analyzed
Authors and Affiliations
Sruthy R. S.
Brain Tumor Segmentation and Extraction of MR Images Basedon Improved Watershed Transform
Abstract: Brain tumor extraction in magnetic resonance imaging (MRI) has becoming an emergent researcharea in the field of medical imaging system. Extraction involves detection, localization, tracking, enhancementa...
Anonymizied Approach to Preserve Privacy of Published Data Through Record Elimination
Abstract: Data mining is the process of analyzing data. Data Privacy is collection of data and dissemination of data. Privacy issues arise in different area such as health care, intellectual property, biological da...
Securing Cloud Data Storage
Innovations are necessary to ride the inevitable tide of change. Most of enterprises are striving to reduce their computing cost through the means of virtualization. This demand of reducing the computing cost has...
K Means Clustering Algorithm for Partitioning Data Sets Evaluated From Horizontal Aggregations
Data mining refers to the process of analyzing the data from different perspectives and summarizing it into useful information that is mostly used by the different users for analyzing the data as well as for p...
[u][/u]Effect of Different Mobility Patterns on AODV and OLSR using Different TCP variants
Abstract: In this paper the effect of TCP variant (new reno, tahoe and Sack) is analyzed by using karan’s and nagle theorem by moving nodes at different mobility models on OLSR and AODV protocol. In this nagle theorem is...