Security Enhancement of First Mile Wireless Access with Optimal QoS through Anonymity in Convergence Network
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 2
Abstract
The first mile wireless access of convergence networks is prone to various attacks due to the broadcasting feature of transmission. Most of the existing security measures focus on protection of message contents, leaving the header part in plain text. Therefore, the header part that has source and destination address, when transmitted in plain text, can reveal the information that can be useful for traffic analysis attack. In this paper, a master node generates pseudonym sets for slave nodes by using Unique Pair Sequence (UPS), assigns each set to a node and to itself. The assigned set and master set are transmitted to all the nodes. Each node uses an address randomly picked from the set as source and destination address while transmitting a message, for avoiding traffic analysis attack. For message integrity instead of allocating separate bits for Message Authentication Code (MAC) in a frame, an address selected from the address set, depending on the value generated by hash-keyed function, called Address Embedded Message Authentication Code (AMAC) is followed. Since AMAC does the function of the MAC and includes address, it can be used to transmit a message anonymously as well as to authenticate the message. AMAC, an anonymous scheme where additional bits are avoided is compared with MAC scheme using results obtained from simulating the scenarios for ZIGBEE and WiMax in OPNET 14.5. The simulation results show that AMAC performs better than MAC in terms of QoS metrics also.
Authors and Affiliations
Shankar R , Dananjayan P
Novel Implementation of Text Mining for Reports
In this paper, we propose a text mining system to extract and use the information in radiology reports. The system consists of three main modules: medical finding extractor, report and image retriever. The medical findin...
A new horizon in data security by Cryptography & Steganography
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic t...
An Approach to Secure Larger Size Data with Authenticity and Integrity
The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authen...
NETWORK STORAGE AND ITS FUTURE
In the IT world storage becomes a serious issue. Information storage systems are the bedrock on which a modern company rests. Data has to be available to whoever needs it, whenever they need it, from...
E-Governance and Effective Deliverance of Information and Services to Citizens Architecture
By Progression of information technology resources in India, great opportunity comes to deliver information and services to citizens and business. Proper distribution and delivery of government information and services t...