Network Coding based Privacy Preservation Technique for Multi-Hop Wireless Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Privacy is one of the critical issues in multi-hop wireless networks, where attacks such as traffic analysis and flow tracing can be easily launched by a malicious adversary due to the open wireless medium. Network coding has the potential to traffic analysis attacks since the coding/mixing operation is encouraged at intermediate nodes. On the other hand some other schemes are existing for privacy preservation such as mix based schemes, onion based schemes, proxy based schemes, but they all have some limitations. In this paper we propose a network coding privacy preservation technique in multi-hop wireless networks. This technique overcomes the limitations of the existing systems. With homomorphic encryption, the proposed technique offers three significant privacy preserving features, packet flow untracability and message content confidentiality. By using this technique we can detect how many hackers are trying to attack the network and also detect the target node to which node it’s trying to attack.
Authors and Affiliations
Prof. Santoshkumar. c. bandak, , Miss Jyoti neginal
Data Mining in Clinical Decision Support Systems for Diagnosis, Prediction and Treatment of Heart Disease
Medical errors are both costly and harmful. Medical errors cause thousands of deaths worldwide each year. A clinical decision support system (CDSS) offers opportunities to reduce medical errors as well as to improv...
Intelligent System for detecting, Modeling, Classification of human behavior using image processing, machine vision and OpenCV
Surveillance Cameras has proven to be a key factor in enhancing the public security in many countries around the world . In spite of advancements in image processing and machine vision techniques very less is app...
Role of Artificial intelligence in MANET
An adhoc network consists of wireless mobile nodes forming a temporary network without any infrastructure or centralized administration. Mobile Adhoc Networks (MANET) are self-organizing and self-configuring multihop w...
Study on Techniques to Improve Diversity in Recommender Systems
Recommender systems play a significant role in E-Marketing. Many companies got increase in their sale due to establishing their products in the sites like Amazon.com, Netflix.com, and Movielens.com etc. These sites h...
A Survey of Different Software Fault Prediction Using Data Mining Techniques Methods
Software fault prediction method used to improve the quality of software. Defective module leads to decrease the customer satisfaction and improve cost. Software fault prediction technique implies a good investment...