A Secure Cryptographic Puzzle based Approach Ensuring TotalSecurity for transmitted Information with IP Tracing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Today internet is extremely affected by several attacks such as Denial-of-Service attacks. The source IP address in a packet can be falsified. Thus IP Protocol fails to determine the originator. The attacker performs IP Spoofing and creates attacks. Thus for determining the real source of the attacker several IP Traceback schemes come forward. The available schemes have their own advantages and disadvantages. Computational Complexity is considered as common drawback. With the aim of overcoming the drawback an IP Traceback Digital Signature Algorithm is used for ensuring security for the transmitted data using Socketcommunication As all the available methodologies for IP Traceback, the current approach also focuses only on tracing attacker. With the aim of ensuring a Total security, a Cryptographic puzzle based scheme is also incorporated along with the new approach for preventing Hackers. Here certain puzzles are also used for encrypting the message along with the available methodology. Here the opponent cannot solve the puzzle until the encrypted packet reaches the destination. . The scheme is implemented based on a share market based application. The security of the scheme is also analyzed
Authors and Affiliations
Sruthy R. S.
Blueprint on Comparison of WSN Protocols
Abstract: A sensor network is a group of specialized devices that converts energy of one form into another that also designed to monitor and record condition at places of different areas. Commonly monitored parameters ar...
Mining Interesting Medical Knowledge from Big Data
Abstract: There are many real life applications where uncertain big data is generated. For example: medical data, stock exchange, social media and many more. Big data works on the data which is unstructured. Miningsuch a...
Internet Worm Classification and Detection using Data MiningTechniques
Abstract: Internet worm means separate malware computer programs that repeated itself and in order to spreadone computer to another computer. Malware includes computer viruses, worms, root kits, key loggers, Trojan...
Dynamic Router Selection and Encryption for Secure Data Transmission in Wireless Sensor Networks
[i]Among the various possible threats in the WSN‟s, like node failure, data security, etc., we are presenting this paper in order to circumvent or overcome the „black holes‟ that are formed due to compromised -node (CN)...
A classification of methods for frequent pattern mining
Abstract: Data mining refers to extracting knowledge from large amounts of data. Frequent pattern mining is aheavily researched area in the field of data mining with wide range of applications. Frequent itemsets is...