A Secure Cryptographic Puzzle based Approach Ensuring TotalSecurity for transmitted Information with IP Tracing

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: Today internet is extremely affected by several attacks such as Denial-of-Service attacks. The source IP address in a packet can be falsified. Thus IP Protocol fails to determine the originator. The attacker performs IP Spoofing and creates attacks. Thus for determining the real source of the attacker several IP Traceback schemes come forward. The available schemes have their own advantages and disadvantages. Computational Complexity is considered as common drawback. With the aim of overcoming the drawback an IP Traceback Digital Signature Algorithm is used for ensuring security for the transmitted data using Socketcommunication As all the available methodologies for IP Traceback, the current approach also focuses only on tracing attacker. With the aim of ensuring a Total security, a Cryptographic puzzle based scheme is also incorporated along with the new approach for preventing Hackers. Here certain puzzles are also used for encrypting the message along with the available methodology. Here the opponent cannot solve the puzzle until the encrypted packet reaches the destination. . The scheme is implemented based on a share market based application. The security of the scheme is also analyzed

Authors and Affiliations

Sruthy R. S.

Keywords

Related Articles

Blueprint on Comparison of WSN Protocols

Abstract: A sensor network is a group of specialized devices that converts energy of one form into another that also designed to monitor and record condition at places of different areas. Commonly monitored parameters ar...

Mining Interesting Medical Knowledge from Big Data

Abstract: There are many real life applications where uncertain big data is generated. For example: medical data, stock exchange, social media and many more. Big data works on the data which is unstructured. Miningsuch a...

 Internet Worm Classification and Detection using Data MiningTechniques

 Abstract: Internet worm means separate malware computer programs that repeated itself and in order to spreadone computer to another computer. Malware includes computer viruses, worms, root kits, key loggers, Trojan...

 Dynamic Router Selection and Encryption for Secure Data Transmission in Wireless Sensor Networks

[i]Among the various possible threats in the WSN‟s, like node failure, data security, etc., we are presenting this paper in order to circumvent or overcome the „black holes‟ that are formed due to compromised -node (CN)...

 A classification of methods for frequent pattern mining

 Abstract: Data mining refers to extracting knowledge from large amounts of data. Frequent pattern mining is aheavily researched area in the field of data mining with wide range of applications. Frequent itemsets is...

Download PDF file
  • EP ID EP126890
  • DOI -
  • Views 134
  • Downloads 0

How To Cite

Sruthy R. S. (2014).  A Secure Cryptographic Puzzle based Approach Ensuring TotalSecurity for transmitted Information with IP Tracing. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 27-32. https://europub.co.uk/articles/-A-126890