Network Coding based Privacy Preservation Technique for Multi-Hop Wireless Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Privacy is one of the critical issues in multi-hop wireless networks, where attacks such as traffic analysis and flow tracing can be easily launched by a malicious adversary due to the open wireless medium. Network coding has the potential to traffic analysis attacks since the coding/mixing operation is encouraged at intermediate nodes. On the other hand some other schemes are existing for privacy preservation such as mix based schemes, onion based schemes, proxy based schemes, but they all have some limitations. In this paper we propose a network coding privacy preservation technique in multi-hop wireless networks. This technique overcomes the limitations of the existing systems. With homomorphic encryption, the proposed technique offers three significant privacy preserving features, packet flow untracability and message content confidentiality. By using this technique we can detect how many hackers are trying to attack the network and also detect the target node to which node it’s trying to attack.
Authors and Affiliations
Prof. Santoshkumar. c. bandak, , Miss Jyoti neginal
A Low-Quiescent Current Two- Input/Output Buffer with Class A-B Output Stage for LCD Driver
the evolution of compact, light-weight, low-power, and high-quality displays has caused a large demand for liquid crystal display (LCD) drivers, with features such as low cost, low power dissipation, high speed, an...
Guideline of Data Mining Technique in Healthcare Application
In today’s world, healthcare is the most important factor affecting human life. The management of health care database is the most challenging subject of this era. For this the data mining has been used intensively...
ASHA: AGENT BASED SECURE HOST ARP CACHE MANAGEMENT
Host systems are exchange their IP-MAC pairs to establish communication. ARP (address resolution protocol) is maintains the IP-MAC pair of address of host in the cache table when the messages are receiving and send...
Preventing SQL Injection Attacks Using Combinatorial Approach
SQL injection is a hazard to web applications, which gives attackers unrestricted access to the database. The attacker thereby can supply malicious or corrupted input that compromises an application. This leads to...
A Survey on Routing Protocol for Wireless Sensor Network
This paper gives the survey on routing protocol for wireless sensor networks. In recent years, many approaches and techniques have been proposed for consuming the energy efficiency of the Wireless Sensor Network....