A Novel Secure On-Demand Routing Protocol for MANET using RSA Triple Key Technique
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 8
Abstract
MANET (Mobile and Ad hoc Networks) are networks in which nodes are mobile and link connectivity might change all the time. In this kind of networks routing, security and key management are the important and complex problems. Privacy-preserving routing is crucial for some ad hoc networks that require stronger privacy protection. A number of schemes have been proposed to protect privacy in ad hoc networks. However, none of these schemes offer complete unlinkability or unobservability property since data packets and control packets are still linkable and distinguishable in these schemes. In this paper, stronger privacy requirements regarding privacy-preserving routing in mobile ad hoc networks is defined. Then an unobservable secure routing scheme USOR using RSA algorithm is proposed to offer complete unlinkability and content unobservability. Which is efficient as well as we have implemented the security technique so that we can prevent the data loss at the time of transmission. We implement USOR on NS2 and the simulation results shows that USOR not only has satisfactory performance, but also achieves strong privacy protection than existing schemes.
Authors and Affiliations
Indu S, Jais John, Parameshachari B D, Muruganatham C, H S DivakaraMurthy
A New Wavelet Packet Based Method for Denoising of Biological Signals
Wavelet packets have been found to be effective in denoising of biological signals. Wavelet based denoising methods widely employ hard and soft thresholding filters for denoising the signals. This paper introduces a N...
Empowering Document Clustering Through Multi View-Point Based Similarity Measure
Among data mining technique, clustering is one of the most important and traditional concept also an unsupervised learning paradigm. Similarity of a document pairs can be measured by matching of concepts. Finding or...
A Systematic Methodology and Guidelines for Software Project Manager to Identify Key Stakeholders
Involving as many as possible of those who may be affected by or have an effect on any software project will lead to a better understanding, better process, greater community support as well as a more effective system...
Evaluating Packet Hiding Methods In Wireless Networks
This paper, explains the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attacks, it selectively targets the messages of high prio...
Assemblage Statistics through Big Data in Cloud with Accredit Public Analyse
Cloud computing is constantly growing as a standard for sharing the information over the remote stockpiling in an online cloud server. Cloud administrations offers awesome enhancements for the clients to appreciate t...