An Efficient Secure Anonymous Communication Protocol in MANET based on Destinations Location
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: The protocols and cryptographic techniques used in MANET are intended to provide complete security to the data transmitted with low cost. In hostile environments, as a part of providing security to data; the source, destination and route of the data need to be anonymous. Prior works do not provide complete anonymity protection along with security, reduced network overhead and cost, sever side security and efficient utilization of resources. So “An Efficient Secure Anonymous Communication Protocol in MANET based on Destination’s Location is proposed”. This paper “An Efficient Secure Anonymous Communication Protocol in MANET based on Destinations Location” uses a technique called one-hop-distance; one-hop-distance along with public key encryption technique provides security of data and anonymity of route and destination. To provide source anonymity, this paper presents the concept of a proxy node. The technique one hop distance presents in this paper can also prevent different types of attacks such as intersection attack, black hole attack etc…, and can reduce the network overhead and cost of data transmission. Their by the resources in MANET can be efficiently utilized to the maximum
Authors and Affiliations
Jyothis B. Kallada, , Renjith George
Privacy Preserving and Load Balancing For Secure Cloud Storage
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data sto...
ICHALEC Improved Cluster Head And Low Energy Consumption Protocol In Wireless Sensor Network
Wireless Sensor Network is an emerging field for research in most of the aspects of mankind. It is a network composed of nodes without any central controller. Sensor network protocols have high ability to be used in each...
Conceptual Design of “Lotos” Motorcar
Abstract: This work presents conceptual design of new “Lotos” motorcar. Brief review of analogue prototypes of different world-known motorcar manufacturers was made. When body concept design was created, bionic form of...
Adaptive Steganography Based Enhanced Cipher HidingTechnique for Secure Data Transfer
Abstract:There have been enormous number of attacks recorded during electronic transmission of informationbetween the source and intended receiver and indeed this has called for a more robust and efficient method f...
Online Password Guessing Attacks by Using Persuasive Click Point with Dynamic User Block
Abstract: The goal of knowledge-based authentication system is to guide the users in creating graphical passwords. User often creates memorable passwords that are easy for attackers to guess, but strong system assi...