Network Coding based Privacy Preservation Technique for Multi-Hop Wireless Networks  

Abstract

Privacy is one of the critical issues in multi-hop wireless networks, where attacks such as traffic analysis and flow tracing can be easily launched by a malicious adversary due to the open wireless medium. Network coding has the potential to traffic analysis attacks since the coding/mixing operation is encouraged at intermediate nodes. On the other hand some other schemes are existing for privacy preservation such as mix based schemes, onion based schemes, proxy based schemes, but they all have some limitations. In this paper we propose a network coding privacy preservation technique in multi-hop wireless networks. This technique overcomes the limitations of the existing systems. With homomorphic encryption, the proposed technique offers three significant privacy preserving features, packet flow untracability and message content confidentiality. By using this technique we can detect how many hackers are trying to attack the network and also detect the target node to which node it’s trying to attack.  

Authors and Affiliations

Prof. Santoshkumar. c. bandak, , Miss Jyoti neginal

Keywords

Related Articles

Design and implementation of low power 16 bit ALU with clock gating  

The ALU is one of the most frequently accessed modules in a CPU and is utilized during most instruction executions. Hence the power consumption of the ALU is a major concern.In this paper a low power 16 bit ALU is...

A survey on AODV routing protocol for AD-HOC Network

Now a day, Ad-hoc network has become an indivisible part for communication for mobile devices. There are different types of topology for implementation of Ad-hoc network. AODV is one of them which are a reactive protocol...

Xml Based Solution to MDA 

We know that UML is widely used for the specification and modeling of software. Model driven approach uses unified modeling language as platform independent model and convert it into platform specific model by ad...

Recursive Pseudo-Exhaustive Two-Pattern Generator  

Pseudo-exhaustive pattern generators for built-in self-test (BIST) provide high fault coverage of detectable combinational faults with much fewer test vectors than exhaustive generation. In (n, k)-adjacent bit ps...

Open-Source Network Simulation Tools: An Overview

In the network research area, implementation of a whole network in real world is not easily possible because establishing of network in a real world is very difficult. A single test bed containing multiple networked comp...

Download PDF file
  • EP ID EP109750
  • DOI -
  • Views 107
  • Downloads 0

How To Cite

Prof. Santoshkumar. c. bandak, , Miss Jyoti neginal (2012). Network Coding based Privacy Preservation Technique for Multi-Hop Wireless Networks  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(4), 177-181. https://europub.co.uk/articles/-A-109750