An Efficient Authentication and Access Control Scheme to Protect Integrity of Anonymous Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
Concerns about privacy and security have received greater attention with the rapid growth and public acceptance of the Internet and the pervasive deployment of various network technologies. Anonymous network services is a large field of research and development that steadily continues to grow. Several credential systems have been proposed in which users can authenticate to services anonymously. Various anonymous network are readily available such as tor, i2p these allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. But this provision can be utilized both by the genuine users and misbehaving ones alike. Dishonest users take advantage of anonymity for abusive purpose such as website defacing. The administrators of these websites are unable to blacklist such users since their identity is not known. As a result they block the complete network using onion routing to ensure protection to their servers denying anonymous access to genuine and dishonest users alike. To surmount this problem, assuming a tor environment a credential system is proposed which enables the system administrators to detect any malicious activity and further block the malicious user continuing un-interrupted access to genuine users
Authors and Affiliations
Santhosh S , Asst. Prof Alok Ranjan,
Performance Evaluation of AODV under Blackhole attack in MANET using NS2 simulator
A wireless ad-hoc network is a temporary network set up by wireless mobile nodes moving arbitrary in the place that have no network infrastructure. Basically Wireless or mobile networks are evolved to replace the w...
Overview Of Video Condensation In Streaming Video
proficient browsing of long video series a main tool in video surveillance. Example: for earlier event video forensics, but can also be used for quick review of moving pictures and home videos. Since there are ma...
Leakage Power Reduction Through Hybrid Multi-Threshold CMOS Stack Technique In Power Gating Switch
In this paper Two Hybrid digital circuit design techniques are produced as Hybrid Multi-Threshold CMOS complete stack technique and Hybrid Multi-Threshold CMOS partial stack technique for reducing the leakage power dissi...
A SURVEY ON ENHANCED APPROACH FOR CATEGORICAL LINK BASED CLUSTERING
Data clustering is a challenging task in data mining technique. Various clustering algorithms are developed to cluster or categorize the datasets. Many algorithms are used to cluster the categorical data. Some algo...
Design of Area Efficient High Speed Parallel Multiplier Using Low Power Technique on 0.18um technology
Based on the simplification of the addition operations in a low-power bypassing-based multiplier, a low-cost low-power bypassing-based multiplier is proposed. Row-bypassing multiplier, column-bypassing multiplier and bru...