A Secure Cryptographic Puzzle based Approach Ensuring TotalSecurity for transmitted Information with IP Tracing

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: Today internet is extremely affected by several attacks such as Denial-of-Service attacks. The source IP address in a packet can be falsified. Thus IP Protocol fails to determine the originator. The attacker performs IP Spoofing and creates attacks. Thus for determining the real source of the attacker several IP Traceback schemes come forward. The available schemes have their own advantages and disadvantages. Computational Complexity is considered as common drawback. With the aim of overcoming the drawback an IP Traceback Digital Signature Algorithm is used for ensuring security for the transmitted data using Socketcommunication As all the available methodologies for IP Traceback, the current approach also focuses only on tracing attacker. With the aim of ensuring a Total security, a Cryptographic puzzle based scheme is also incorporated along with the new approach for preventing Hackers. Here certain puzzles are also used for encrypting the message along with the available methodology. Here the opponent cannot solve the puzzle until the encrypted packet reaches the destination. . The scheme is implemented based on a share market based application. The security of the scheme is also analyzed

Authors and Affiliations

Sruthy R. S.

Keywords

Related Articles

SGEDSS: Semantic Gene Expression Model for Communication Decision Supportsystem

Abstract: An effective decision support system needs to deal with several heterogeneous data sources. Sometimes, the knowledge was explored without integration data sources are wrong. Also, Decision support system is wea...

 Comparative Analysis of Various Grid Based SchedulingAlgorithms

 Abstract : Grid computing provides access to heterogeneous resources which are distributed geographicallywhich makes resource scheduling a complex problem. Hence, scheduling algorithms are necessary whichallocate j...

 Domain Independent Joint Sentiment And Topic Detection UsingAFINN And Other Lexicons

Abstract: Sentiment analysis and opinion mining field concentrates on automatically classifying sentiments of documents. But detecting mere sentiments does not provide one the sufficient knowledge concealed in the text.I...

Driving Simulator

  Abstract: Simulators which are developed by suppliers individually for specific application purpose are known as Driving Simulator. Most of the conventional driving simulators provide some flexibility for construc...

Overview: Importance of Network Security and Future Issues

Abstract: Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a bett...

Download PDF file
  • EP ID EP126890
  • DOI -
  • Views 91
  • Downloads 0

How To Cite

Sruthy R. S. (2014).  A Secure Cryptographic Puzzle based Approach Ensuring TotalSecurity for transmitted Information with IP Tracing. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 27-32. https://europub.co.uk/articles/-A-126890