Privacy Protection Using Unobservablity and Unlink ability against Wormhole Attacks in Manet
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 2
Abstract
ABSTRACT: An efficient privacy-preserving routing protocol USOR that achieves content un-observability by employing anonymous key establishment based on group signature. The setup of USOR is simple: In privacy-preserving communications can largely be divided into two categories: cryptosystem-based techniques and broadcasting-based techniques. The cryptosystem-based techniques include mix-based systems and secure multiparty computation-based systems, originating from mix net and DC-net respectively. Broadcasting based schemes provide communication privacy by mixing the real messages with dummy packets so that it is infeasible for the adversaries to identify the real packets and track the message source. First, an anonymous key establishment process is performed to construct secret session keys. Then an unobservable route discovery process is executed to find a route to the destination. This process is done by establishing session keys between two nodes. After verifying the signature between themselves, the anonymous key is established between these two nodes which mean the two nodes establish this key without knowing who the other party is. It can effectively prevent replay attacks and session key disclosure attack, and meanwhile, it achieves key confirmation for established session keys. This key establishment protocol uses elliptic curve Diffie- Hellman (ECDH) key exchange to replace Diffie-Hellman key exchange, and uses group signature to replace MAC code.In this protocol, both control packets and data packets look random and indistinguishable from dummy packets for outside adversaries. Only valid nodes can distinguish routing packets and data packets from dummy traffic with inexpensive symmetric decryption.
Authors and Affiliations
N. Sugumar
An Empirical Study on Identification of Strokes and their Significance in Script Identification
India is a multilingual, multi-script country. There are totally 22 official languages and 12 scripts in India. People adopted to use two or more languages resulting in bilingual and trilingual documents. Many of...
Configurable Monitoring For Multi-Domain Networks
In this paper, we review the state-of-the-art monitoring architectures proposed for multi-domain networks. We establish the five requirements a multi-domain monitoring architecture must fulfilled. We note that these arch...
FPGA Based Wireless Jamming Networks
A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base stations. When used, the jammer effectively disables cellular phones. These devices can be used in practical...
PERSONALIZATION CONCEPT BASED USER PROFILE ON SEARCH ENGINE
In the present days the search engines return the same results for the same query, regardless of the user’s interest. So in order to avoid that we introduce new concept called personalization. The Personalized Sear...
Modal Analysis of Adhesively Bonded Joints of Different Materials
Abstract: It is important to study the modal analysis (natural frequency and mode shape) of the single lap adhesive joint to understand the dynamic nature of the systems, and also in design and control. In this wor...