Privacy Protection Using Unobservablity and Unlink ability against Wormhole Attacks in Manet

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 2

Abstract

 ABSTRACT: An efficient privacy-preserving routing protocol USOR that achieves content un-observability by employing anonymous key establishment based on group signature. The setup of USOR is simple: In privacy-preserving communications can largely be divided into two categories: cryptosystem-based techniques and broadcasting-based techniques. The cryptosystem-based techniques include mix-based systems and secure multiparty computation-based systems, originating from mix net and DC-net respectively. Broadcasting based schemes provide communication privacy by mixing the real messages with dummy packets so that it is infeasible for the adversaries to identify the real packets and track the message source. First, an anonymous key establishment process is performed to construct secret session keys. Then an unobservable route discovery process is executed to find a route to the destination. This process is done by establishing session keys between two nodes. After verifying the signature between themselves, the anonymous key is established between these two nodes which mean the two nodes establish this key without knowing who the other party is. It can effectively prevent replay attacks and session key disclosure attack, and meanwhile, it achieves key confirmation for established session keys. This key establishment protocol uses elliptic curve Diffie- Hellman (ECDH) key exchange to replace Diffie-Hellman key exchange, and uses group signature to replace MAC code.In this protocol, both control packets and data packets look random and indistinguishable from dummy packets for outside adversaries. Only valid nodes can distinguish routing packets and data packets from dummy traffic with inexpensive symmetric decryption.

Authors and Affiliations

N. Sugumar

Keywords

Related Articles

An Automated Method for Segmentation of the Hand In Sign Language

 This paper presents an automated method for hand segmentation in images that make use of signs language. For this, used an images bank that was captured by a webcam to which were applied spatial domain methods fo...

Design and Analysis Special Shaped Milling Cutter Using Finite Element Analysis

Milling is a production process which is based on material removal using multipoint cutting tools, as a result higher material removal rates can be achieved along with high surface finish. The common operations performed...

 Diffusion Bonding of Semi-Solid (SSM 356) Cast Aluminum Alloy

 A new technique to achieve the globular weld structure of SSM 356 aluminum alloy was conducted. The effect of joining parameters on the microstructure and mechanical properties of diffusion bonding butt joints of s...

 esign and Implementation of an Encryption and Decryption Using Non-Linear RM-PRNG

 Pseudo Random Number Generator (PRNG) is an algorithm for generating a sequence of numbers. Due to speed in number generation pseudorandom numbers are very important. The increasing application of cryptographicalgo...

 Design, Simulation and Implementation of Flyback based, True Single Stage, Isolated, Power Factor Corrected AC-DC Converter for Solar Array Simulators

Presently most of the Power Factor correction circuits are based on boost topology. They consist of two  stages, one being the power factor correction (pre-regulator) and later DC-DC conversion stage. This paper pre...

Download PDF file
  • EP ID EP93229
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

N. Sugumar (2013).  Privacy Protection Using Unobservablity and Unlink ability against Wormhole Attacks in Manet. International Journal of Modern Engineering Research (IJMER), 3(2), 785-787. https://europub.co.uk/articles/-A-93229