Detecting Intruders and Packet Modifiers in Wireless Sensor Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 8, Issue 5
Abstract
The multicast authentication protocol namely MABS including two schemes MABS-B and MABS-E. The basic scheme (MABS-B) eliminates packet loss and also efficient in terms of latency computation and communication overhead due to effective cryptographic primitive called batch signature which authenticates any number of packets simultaneously. This paper deals with the enhanced scheme (MABS-E) which combines the basic scheme with a packet filtering mechanism to alleviate DOS impact. The file list is displayed in both sender and the receiver but the file content is present in the sender only. The receiver request the file content by sending the file name then the sender verify the request if the receiver is authentic. Then sender splits the file content into packets and signs each packet by generating the key then encrypts the packets and sends to the receiver. The receiver verifies the packets and then decrypts the message using sender’s public key
Authors and Affiliations
S Navaneethan
IVRS and DTMF based Voting System
Abstract: A Voting System will be developed where a person can vote using a cell phone. A phone connected tothe voting system, will decode the DTMF pulses sent by another phone(mobile/landline) belonging to the vot...
Web Logs Analysis for Finding Brand Status
Abstract: Due to rapid development of the web there has been vast increase in the user generated contents available in the form of blogs ,product reviews sites, web- forums and online social networks etc. Such revi...
Competent Tracking of Moving Object Using Affine & Illumination Insensitive Template Matching
Abstract : Moving object detection & tracking in real world scene is becoming significant problem in today’s era. The extensive study in this area is motivated by potential number of applications of object tracking....
Visual Cryptography Implementation with Key Sharing For Effective Phishing Detection Process
The advent of the internet, various online attacks has been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal, confidential information such...
Data attribute security and privacy in distributed database system
Now a days there are a need of data attribute security in distributed database while preserving privacy. In the proposed work, we consider problem related in publishing collaborative data for anonymizing,vertically and h...