Network Coding based Privacy Preservation Technique for Multi-Hop Wireless Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Privacy is one of the critical issues in multi-hop wireless networks, where attacks such as traffic analysis and flow tracing can be easily launched by a malicious adversary due to the open wireless medium. Network coding has the potential to traffic analysis attacks since the coding/mixing operation is encouraged at intermediate nodes. On the other hand some other schemes are existing for privacy preservation such as mix based schemes, onion based schemes, proxy based schemes, but they all have some limitations. In this paper we propose a network coding privacy preservation technique in multi-hop wireless networks. This technique overcomes the limitations of the existing systems. With homomorphic encryption, the proposed technique offers three significant privacy preserving features, packet flow untracability and message content confidentiality. By using this technique we can detect how many hackers are trying to attack the network and also detect the target node to which node it’s trying to attack.
Authors and Affiliations
Prof. Santoshkumar. c. bandak, , Miss Jyoti neginal
Design and implementation of low power 16 bit ALU with clock gating
The ALU is one of the most frequently accessed modules in a CPU and is utilized during most instruction executions. Hence the power consumption of the ALU is a major concern.In this paper a low power 16 bit ALU is...
A survey on AODV routing protocol for AD-HOC Network
Now a day, Ad-hoc network has become an indivisible part for communication for mobile devices. There are different types of topology for implementation of Ad-hoc network. AODV is one of them which are a reactive protocol...
Xml Based Solution to MDA
We know that UML is widely used for the specification and modeling of software. Model driven approach uses unified modeling language as platform independent model and convert it into platform specific model by ad...
Recursive Pseudo-Exhaustive Two-Pattern Generator
Pseudo-exhaustive pattern generators for built-in self-test (BIST) provide high fault coverage of detectable combinational faults with much fewer test vectors than exhaustive generation. In (n, k)-adjacent bit ps...
Open-Source Network Simulation Tools: An Overview
In the network research area, implementation of a whole network in real world is not easily possible because establishing of network in a real world is very difficult. A single test bed containing multiple networked comp...