Privacy Protection Using Unobservablity and Unlink ability against Wormhole Attacks in Manet
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 2
Abstract
ABSTRACT: An efficient privacy-preserving routing protocol USOR that achieves content un-observability by employing anonymous key establishment based on group signature. The setup of USOR is simple: In privacy-preserving communications can largely be divided into two categories: cryptosystem-based techniques and broadcasting-based techniques. The cryptosystem-based techniques include mix-based systems and secure multiparty computation-based systems, originating from mix net and DC-net respectively. Broadcasting based schemes provide communication privacy by mixing the real messages with dummy packets so that it is infeasible for the adversaries to identify the real packets and track the message source. First, an anonymous key establishment process is performed to construct secret session keys. Then an unobservable route discovery process is executed to find a route to the destination. This process is done by establishing session keys between two nodes. After verifying the signature between themselves, the anonymous key is established between these two nodes which mean the two nodes establish this key without knowing who the other party is. It can effectively prevent replay attacks and session key disclosure attack, and meanwhile, it achieves key confirmation for established session keys. This key establishment protocol uses elliptic curve Diffie- Hellman (ECDH) key exchange to replace Diffie-Hellman key exchange, and uses group signature to replace MAC code.In this protocol, both control packets and data packets look random and indistinguishable from dummy packets for outside adversaries. Only valid nodes can distinguish routing packets and data packets from dummy traffic with inexpensive symmetric decryption.
Authors and Affiliations
N. Sugumar
SOME IMPUTATION METHODS IN DOUBLE SAMPLING SCHEME FOR ESTIMATION OF POPULATION MEAN
To estimate the population mean with imputation, i.e. the technique of substituting missing data, there are a number of techniques available in literature like Ratio method of imputation, Compromised method of impu...
An Introductory Comment on Wave Relativity
Wave criterion of special and general relativity can be introduced in this paper. A report can be drawn; about wave mechanical relativistic idea in it.
Effect of V Notch Shape on Fatigue Life in Steel Beam Made of High Carbon Steel Alloy AISI 1078
The present work includes study effect of V notch shape with various angle orientation and depths on fatigue life behavior in steel beam made of High Carbon Steel alloy AISI 1078 which has a wide application in i...
Prediction of groundwater quality in Selected Locations in Imo State
The prediction of groundwater quality in selected locations was carried out in Owerri-West L.G.A. of Imo State. The Physical, chemical and biological parameters of groundwater samples from Nekede (Ward A), Ihia...
An Application of Energy and Exergy Analysis of Transport Sector of India
The present article is dedicated for evaluating the transportation sector of India in terms of energetic and exergetic aspects. In this regard, energy and exergy utilization efficiencies during the period 2005-...