Secure Privacy-Preserving and Low Overhead Communication Protocol for Hybrid Ad Hoc Wireless Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
In hybrid adhoc networks for securing communication and preserving users anonymity and location privacy we propose light weight protocol. To secure route discovery and data transmission symmetric-key-cryptography operations and payment system are used. The payment can be secured without submitting or processing payment proofs to reduce the overhead.With low overhead, to preserve user’s anonymity, we develop efficient pseudonym generation and trapdoor techniques that do not use the resource-consuming asymmetric-key cryptography. Pseudonyms do not require large storage area or frequently contacting a central unit for refilling. Our trapdoor technique uses only lightweight hashing operations. This trapdoor may be processed by a large number of nodes. The development of low-overhead secure and privacypreserving protocol is a real challengefor its inherent contradictionsi.e. for securing the protocol requires each node to use one authenticated identity, but a permanent identity should not be used for privacy preservation and for the low overhead requirement contradicts with the large overhead usually needed for preserving privacy and securing the communication. The analysis and simulation results states with low overhead our protocol can preserve privacy and secure the communication.
Authors and Affiliations
A. Rama Krishna, D. Durga Prasad
Simcard’s Address Book Access System
As the rapid growth in telecom companies and services provided by them mobile phone has become necessity for society as mobile phone are not just for calling but also aids other features like camera, clock, music player...
Home Automation Using IoT with Raspberry Pi
This paper presents a Smart Home system based empowered by networking technology, single board computer Raspberry Pi and Android Powered Devices. The proposed Smart Home system is restricted do image transmission for ho...
Hardware Co-Simulation of Sobel Edge Detection Using FPGA and System Generator
This paper implements an image processing algorithm applicable to Edge Detection for still image in a Xilinx FPGA using System Generator. We prefer sobel algorithm which is most reliable and gives us an efficient output...
Multipath Routing Using Neuro Fuzzy in Wireless Sensor Network
In this project, neuro fuzzy mulipath routing protocol around connectivity holes is developed. The neuro fuzzy multipath routing protocol is mainly used as a apparatus to sense and route around connectivity shacks. The...
Bending Analysis of Functionally Graded Beam by Refined Theory
A refined theory is applied for the flexural analysis of functionally graded beams. The present study involves four unknown variables which are five in first order shear deformation theory or any other higher order theo...