Study on Secure Data Transmission through Dual-Path Rating Mechanism
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 3
Abstract
In this paper, we propose a mechanism which would work on real time network environment and split the data before making transmission and merge the data before presenting to the user. The main objective of this paper is to study and analyse information security problem while the data is being transmitted over a network and propose a technique that will solve most of the hacking problem by attackers. In this approach we divide the information packets flowing through a single path to flow through two different paths and reach destination. When information leaves the source machine it will be split into 2 parts and take 2 different routes to reach destination machine. After reaching destination again the packets will be combined and presented to the user. Thus providing a reliable way of data transmission while maintaining Data Integrity.
Authors and Affiliations
Safia Fatima
OPTIMIZING PARAMETERS OF FUZZY ART FOR IMPROVING THE ACCURACY OF NIDS
Intrusion Detection System (IDS) has been developed in order to provide a defense mechanism against the intrusive activities carried over network. This paper discusses an approach of Intrusion detection system using F...
Factor Interactions and the Modelling Of Biodiesel Production Reaction from Waste Vegetable Oil
Chemically transesterified biodiesel is a mixture of mono – alkyl esters of triglycerides synthesized from a variety of lipids sources. The yield of biodiesel is influenced by several variable factors. This paper...
EXTRINSICALLY CARBON FIBER REINFORCED POLYMER/ALUMINUM FOAM SANDWICH COMPOSITES
The design and the requirements within the constructive development of technical systems cause a connection of different material properties and the combination of different production processes to novel and innovative...
Mobile Ad Hoc Networks Security: Challenges and solutions
Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wire line networks, the unique characteristics of mobile ad hoc networks pose...
Ancient Tamil Vattezhutthu Alphabets Recognition in Stone Inscription Using Wavelet Transform and SVM Classifier
This paper presents the application of wavelet processing in the domain of Tamil Vattezhutthu alphabets recognition in Stone inscription. To attain high recognition rate, robust feature extractors and powerful classifie...