Privacy Protection Using Unobservablity and Unlink ability against Wormhole Attacks in Manet

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 2

Abstract

 ABSTRACT: An efficient privacy-preserving routing protocol USOR that achieves content un-observability by employing anonymous key establishment based on group signature. The setup of USOR is simple: In privacy-preserving communications can largely be divided into two categories: cryptosystem-based techniques and broadcasting-based techniques. The cryptosystem-based techniques include mix-based systems and secure multiparty computation-based systems, originating from mix net and DC-net respectively. Broadcasting based schemes provide communication privacy by mixing the real messages with dummy packets so that it is infeasible for the adversaries to identify the real packets and track the message source. First, an anonymous key establishment process is performed to construct secret session keys. Then an unobservable route discovery process is executed to find a route to the destination. This process is done by establishing session keys between two nodes. After verifying the signature between themselves, the anonymous key is established between these two nodes which mean the two nodes establish this key without knowing who the other party is. It can effectively prevent replay attacks and session key disclosure attack, and meanwhile, it achieves key confirmation for established session keys. This key establishment protocol uses elliptic curve Diffie- Hellman (ECDH) key exchange to replace Diffie-Hellman key exchange, and uses group signature to replace MAC code.In this protocol, both control packets and data packets look random and indistinguishable from dummy packets for outside adversaries. Only valid nodes can distinguish routing packets and data packets from dummy traffic with inexpensive symmetric decryption.

Authors and Affiliations

N. Sugumar

Keywords

Related Articles

Investigation of strain hardening effects in CNC milling and chemical etching of Al 7075: A comparative study

Data representation on the components can be done by engraving on the metal. This operation on the test  specimen was done by two ways. CNC milling and chemical etching were done on aluminium 7075 to  represent...

[b][i]Improving the Stability of Cascaded DC Power Supply System by Adaptive Active Capacitor Converter[/i][/b]

When all links are changes in the cascade is the corner of the shape in the dc division energy orbit (DEO). When resistances are intermission betwixt one by one stylish changes in that would possibly end up so...

 Human Detection, Tracking and Trajectory Extraction in a Surveillance Camera network

 This paper proposes human tracking and recognition method in a camera network. Human matching in a multi-camera surveillance system is a fundamental issue for increasing the accuracy of recognition in multiple vi...

 A Review on Study of Jaw Plates of Jaw Crushe

 Abstract: Crushers are major size reduction equipment used in mechanical , metallurgical and allied industries which crushes different types of soft and hard materials. swing jaw plates are takes direct part into...

 Stability of System matrix via Gerschgorin circles

 In this paper the stability of the system can be analyzed graphically using Gerschgorin circle theorem. Analytically it has been proved that if the left Gerschgorin bound are very much greater than the ri...

Download PDF file
  • EP ID EP93229
  • DOI -
  • Views 105
  • Downloads 0

How To Cite

N. Sugumar (2013).  Privacy Protection Using Unobservablity and Unlink ability against Wormhole Attacks in Manet. International Journal of Modern Engineering Research (IJMER), 3(2), 785-787. https://www.europub.co.uk/articles/-A-93229