Secure Privacy-Preserving and Low Overhead Communication Protocol for Hybrid Ad Hoc Wireless Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
In hybrid adhoc networks for securing communication and preserving users anonymity and location privacy we propose light weight protocol. To secure route discovery and data transmission symmetric-key-cryptography operations and payment system are used. The payment can be secured without submitting or processing payment proofs to reduce the overhead.With low overhead, to preserve user’s anonymity, we develop efficient pseudonym generation and trapdoor techniques that do not use the resource-consuming asymmetric-key cryptography. Pseudonyms do not require large storage area or frequently contacting a central unit for refilling. Our trapdoor technique uses only lightweight hashing operations. This trapdoor may be processed by a large number of nodes. The development of low-overhead secure and privacypreserving protocol is a real challengefor its inherent contradictionsi.e. for securing the protocol requires each node to use one authenticated identity, but a permanent identity should not be used for privacy preservation and for the low overhead requirement contradicts with the large overhead usually needed for preserving privacy and securing the communication. The analysis and simulation results states with low overhead our protocol can preserve privacy and secure the communication.
Authors and Affiliations
A. Rama Krishna, D. Durga Prasad
Review of A New Approach for Hybrid Technology Monitoring and Logger System for Electricity
In India total electricity generation has depends upon the water. So, 60% or 70% water is used for electricity generation from dam; hence, shortage of water is take place for drinking & farming. To reduce the generation...
Big Data Security Using System Logs
A series of recent high-profile security breaches have underscored that malware prevention strategies are consistently failing to adequately protect enterprises from advanced persistent threats (APTs). It’s time to embr...
slugSocial Networking Sites (SNS): A Quick study and its impact for Educational & Social Platform
Social Networking Sites have millions of users with global connections. More and more, people are turning to the Internet to keep in touch with friends, family and colleagues. Some popular social sites in the world are...
Deduplicating Data in Cloud and Secure Auditing
As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. N...
slugBit Error Rate Performance in Coherent Optical Systems
The probability of a transmitted bit error is generally termed as BER. It is calculated by the ratio of incorrectly transmitted bits to total transmitted bits. Regardless of the data destination, an optical transport sy...