Security Enhancement of First Mile Wireless Access with Optimal QoS through Anonymity in Convergence Network
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 2
Abstract
The first mile wireless access of convergence networks is prone to various attacks due to the broadcasting feature of transmission. Most of the existing security measures focus on protection of message contents, leaving the header part in plain text. Therefore, the header part that has source and destination address, when transmitted in plain text, can reveal the information that can be useful for traffic analysis attack. In this paper, a master node generates pseudonym sets for slave nodes by using Unique Pair Sequence (UPS), assigns each set to a node and to itself. The assigned set and master set are transmitted to all the nodes. Each node uses an address randomly picked from the set as source and destination address while transmitting a message, for avoiding traffic analysis attack. For message integrity instead of allocating separate bits for Message Authentication Code (MAC) in a frame, an address selected from the address set, depending on the value generated by hash-keyed function, called Address Embedded Message Authentication Code (AMAC) is followed. Since AMAC does the function of the MAC and includes address, it can be used to transmit a message anonymously as well as to authenticate the message. AMAC, an anonymous scheme where additional bits are avoided is compared with MAC scheme using results obtained from simulating the scenarios for ZIGBEE and WiMax in OPNET 14.5. The simulation results show that AMAC performs better than MAC in terms of QoS metrics also.
Authors and Affiliations
Shankar R , Dananjayan P
AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION
Automatic image retargeting is used for large image.That are to be fit in small size display devices. Without any loss of information.our proposed methods one is saliency based mesh parameterization method is used to re...
Knowledge Engineering-an overview
Knowledge Engineering is an important concept in recent years. Knowledge Engineering is the aspect of system engineering which addresses uncertain process requirements by emphasizing the acquisition of kno...
Pattern Extraction, Classification and Comparison Between Attribute Selection Measures
In this research, we have compared three different attribute selection measures algorithms. We have used ID3 algorithm, C4.5 algorithm and CART algorithm. All these algorithms are decision tree based algor...
Study of Security in Wireless Sensor Networks
Wireless Sensor Network (WSN) is an emerging technology that shows great assure for various futuristic applications both for public and military. Many researchers tried to develop further cost and energy e...
Analysis of Data and Traffic Management during Privacy Preservation in Secure Multiparty Computation
-A protocol is secure if th e parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute th e inputs using the function f and give the re sult t o the respec tive parties...