Cryptographic Approach of Generic Caching strategy for Opportunistic Wireless Networks (OPPNETS)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: In Opportunistic networks, if a mobile finds that the content of its interest is available in other mobiles, it will send a message to request for the content and download it. The term subscriber denotes a node which requests for the content and the term publisher denotes a node which has the content. There can be two types of caches in a mobile node, namely private and public caches. Private cache stores the data of its own interest where as public cache stores the data of other nodes’ interests. While a subscriber node requests another node for a particular content that is in the communication range for which it is missing, thereafter it forwards the request to other neighbouring nodes. In the case of public cache, there may be an intruder who issues false requests on behalf of a subscriber thereafter may get the access of the publisher’s device and tries to keep the device busy always and unavailable. Thus it achieves the denial of service (DOS) attack. In this paper I investigate the various attacks that aim to degrade the public caching capabilities and propose a special kind of caching scheme called a Signature Generic Cache which stores the public data contents with the digital signature. Here digital signature is formed by taking the hash of the data content andthen encrypting the data one by one with the publisher’s private key whose purpose is to guarantee the integrity of the cached content. In one-way authentication, the publisher assures that the request is from the trusted user by validating the requester’s digital certificate and thus it avoids security vulnerabilities. In order to conduct my study, I evaluate the performance of Signature generic caching scheme by using OMNET++ simulator. In this paper, I present the results by adopting the latest version of INET framework to implement the concept of Oppnets and NETA framework in order to show the various network attacks which are built on the top of OMNET++.
Authors and Affiliations
L. Jai Vinita
Improving Data Storage Security in Cloud Computing Using RC6 Algorithm
In spite of the huge advantages got from the selection of cloud computing idea, its famous adoption has been determined usually by security concerns. The broadened assault surface in a cloud environment makes it more def...
An Efficient Method to Prevent Information Leakage in Cloud
Abstract : Cloud Computing is storing and accessing data and programs over the Internet instead of personal computers. It is a computing paradigm shift where computing is moved away from personal computers or an in...
Soundness to Single Sign on Using OTP in Distributed Networks
In a distributed system, there are numerous service provider. The user must be authenticated to entrance the services provided by the service provider. It is challenging to recall all secret words for users. So to c...
An Energy Efficient Traffic Routing On Wake-Up Process in Wireless Sensor Network
Abstract: Wireless network consists of distributed sensor nodes to monitor the physical conditions and establish the traffic system. Every node in WSN sends and receives the packet, resulting in wastage of bandwidth.Howe...
Trust Based Secure Payment Scheme for Multi-hop Wireless Networks
In this paper we propose a secure payment scheme called, trust based micro payment scheme for multihop wireless networks.This micro payment scheme enhances the cooperation of nodes and fairness of the network. Each node...