Detecting Intruders and Packet Modifiers in Wireless Sensor Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 8, Issue 5
Abstract
The multicast authentication protocol namely MABS including two schemes MABS-B and MABS-E. The basic scheme (MABS-B) eliminates packet loss and also efficient in terms of latency computation and communication overhead due to effective cryptographic primitive called batch signature which authenticates any number of packets simultaneously. This paper deals with the enhanced scheme (MABS-E) which combines the basic scheme with a packet filtering mechanism to alleviate DOS impact. The file list is displayed in both sender and the receiver but the file content is present in the sender only. The receiver request the file content by sending the file name then the sender verify the request if the receiver is authentic. Then sender splits the file content into packets and signs each packet by generating the key then encrypts the packets and sends to the receiver. The receiver verifies the packets and then decrypts the message using sender’s public key
Authors and Affiliations
S Navaneethan
A Comparison between IEEE 802.11a, b, g, n and ac Standards
Abstract: Recent advances in the communications and connectivity has encouraged the development and definition of various IEEE 802.11 series of standards, such as IEEE802.11a, b, g, n, and ac. Each of the standards...
Modulo Search Trees (Plain and Z-Overlapped)
Abstract: This paper exploits the modulo division operation to construct a tree which is termed as Modulo search tree with two versions out of which one is coined as Plain Modulo Search Tree and the other is termed...
A Survey on Vehicular Ad hoc Networks
Vehicular Ad hoc Networks (VANETs), a subclass of mobile ad hoc network (MANET), is a promising approach for the intelligent transport system (ITS). VANET allows vehicles to form a self-organized network wi...
A Novel Interface to a Web Crawler using VB.NET Technology
The number of web pages is increasing into millions and trillions around the world. To make searching much easier for users, web search engines came into existence. Web Search engines are used to find speci...
Network Traffic Load Balancing In Gateways
Abstract: Load balancing is the practice of evenly distributing work among multiple devices. This technique provides several important benefits. Load Balancing in Gateways is a very important in today's emerging wo...