Detecting Intruders and Packet Modifiers in Wireless Sensor Networks

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 8, Issue 5

Abstract

 The multicast authentication protocol namely MABS including two schemes MABS-B and MABS-E. The basic scheme (MABS-B) eliminates packet loss and also efficient in terms of latency computation and communication overhead due to effective cryptographic primitive called batch signature which authenticates any number of packets simultaneously. This paper deals with the enhanced scheme (MABS-E) which combines the basic scheme with a packet filtering mechanism to alleviate DOS impact. The file list is displayed in both sender and the receiver but the file content is present in the sender only. The receiver request the file content by sending the file name then the sender verify the request if the receiver is authentic. Then sender splits the file content into packets and signs each packet by generating the key then encrypts the packets and sends to the receiver. The receiver verifies the packets and then decrypts the message using sender’s public key

Authors and Affiliations

S Navaneethan

Keywords

Related Articles

 An Improved Novel Steganographic Technique For RGB And YCbCr Colorspace

 Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most...

 Analytical Study of Neural Network Techniques: SOM, MLP and Classifier-A Survey

 Abstract: This paper focuses on the various neural network techniques including Multilayer perceptron (MLP) neural network, classifier and self-organizing maps (SOMs). Various aspects of neural network techniques a...

The Improved Image Encryption-Compression System for Error Clustering and Random Permutation

Abstract: Image encryption must be led before image pressure. In this paper we concentrate how to plan a couple of image encryption and pressure calculations such that packing encoded images can at present be proficientl...

 Optimized Hypergraph Based Social Image Search Using Visual-Textual Joint Relevance Learning

 Abstract: Recent years have witnessed a great success of social media websites. Tag-based image search is an important approach to access the image content of interest on these websites. However, the existing ranki...

 Comparative study of two methods for Handwritten Devanagari  Numeral Recognition

 In this paper two different methods for Numeral Recognition are proposed and their results are compared. The objective of this paper is to provide an efficient and reliable method for recognition of handwritten...

Download PDF file
  • EP ID EP98690
  • DOI -
  • Views 66
  • Downloads 0

How To Cite

S Navaneethan (2013).  Detecting Intruders and Packet Modifiers in Wireless Sensor Networks. IOSR Journals (IOSR Journal of Computer Engineering), 8(5), 1-3. https://europub.co.uk/articles/-A-98690