A Secure Cryptographic Puzzle based Approach Ensuring TotalSecurity for transmitted Information with IP Tracing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Today internet is extremely affected by several attacks such as Denial-of-Service attacks. The source IP address in a packet can be falsified. Thus IP Protocol fails to determine the originator. The attacker performs IP Spoofing and creates attacks. Thus for determining the real source of the attacker several IP Traceback schemes come forward. The available schemes have their own advantages and disadvantages. Computational Complexity is considered as common drawback. With the aim of overcoming the drawback an IP Traceback Digital Signature Algorithm is used for ensuring security for the transmitted data using Socketcommunication As all the available methodologies for IP Traceback, the current approach also focuses only on tracing attacker. With the aim of ensuring a Total security, a Cryptographic puzzle based scheme is also incorporated along with the new approach for preventing Hackers. Here certain puzzles are also used for encrypting the message along with the available methodology. Here the opponent cannot solve the puzzle until the encrypted packet reaches the destination. . The scheme is implemented based on a share market based application. The security of the scheme is also analyzed
Authors and Affiliations
Sruthy R. S.
MANCAFChat - An Application to Evaluate MANCAF Framework
Abstract: The collaborative application uses the MANET to exchange the information between the available nodes. The development of such kind of application takes too much time to implement the network communication servi...
An Energy Efficient Traffic Routing On Wake-Up Process in Wireless Sensor Network
Abstract: Wireless network consists of distributed sensor nodes to monitor the physical conditions and establish the traffic system. Every node in WSN sends and receives the packet, resulting in wastage of bandwidth.Howe...
Component Based Representation Using Probabilistic NeuralNetwork Classifier
Abstract: The law enforcement agency make use of face recognition system for the identification of criminals.In some cases, the photograph of criminals is not available. In this situation,sketch is drawn by the inf...
Qos Parameters of an Energy Efficient Multicast Congestion Control Protocol (Eemccp) Over Fading Channels
In this paper we propose an energy efficient multicasting congestion control protocol for mobile ad hoc networks (MANETs) over fading channels. Our proposed scheme overcomes the disadvantages of existing multicast conges...
Detection and Prevention of Wormhole Attack in MANET UsingDSR Protocol
Abstract: With the advancement in wireless technologies, wireless networks are developing at a fast rate andso are the MANET’s. Several routing attacks are introduced in the wireless networks due to their dynamical...