Integrity And Confidentiality for Network Security
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
We compute the liability metric as a function of the steering and the cryptographic protocols used to secure the complex passage. We formulate the minimum cost node capture attack problem as a nonlinear integer programming problem. The steering protocols in the wireless complex disclose the fact that refuge and steering cannot be established dually. Investigation is done on the impact of node capture attacks on the confidentiality and integrity of complex passage. I develop a method called GNAVE (Greedy Node capture Approximation using Liability Evaluation) to maximize the liability resulting from the capture of each individual nodes using the information required form the previously captured node which dually provides the refuge using RVM (Route Liability Metric) method which quantifies the effective refuge of passage traversing for a given node as well as the optimized steering using set theoretic scrutiny. The liability is measured using steering and cryptographic protocols for the scrutiny of weakness in every node and provides secured complex passage. The minimum cost node capture attack is appraised at every point of time. Using the known parameters like bandwidth, channel capacity, mobility speed the adverse effects can be analyzed. Enter management facility is embedded as a part of this project. A enter management scheme is designed which satisfy the refuge requirements by selectively distributing the enters to the nodes without overhead of computations or bandwidth usage. We investigate the impact of node capture attacks on the confidentiality and integrity of complex passage. Heuristic that approximates the minimum cost attack. We provide examples of node capture attacks using our liability.
Authors and Affiliations
B. Saujanya Rani, U Ch Prasad
Improving QOS Using Virtual Topology Design for OBS Switching Network
In WDM Networks, OPS and OBS provides efficient communications for many internet applications such as high performance scientific computations, video conferencing by combining hundreds of high speed wavelength channe...
Analysis of Multi-dimensional IOT Based Data
Internet of Things (IOT) is a worldwide network that interconnects different objects together. These objects are uniquely addressable via standard communication protocols. IOT that attempts to make the things’ informat...
An Efficient Solution for Mobile Users To Enforce Privacy And Enhance User Participation
The propagation of mobile phones along with their enveloping connectivity has drive the amount of digital data shaped and processed every day. Today many different sensors are by now deployed in our mobile phones and...
Analysis and Applications of IOT using Raspberry Pi
As the next frontier of the Internet, the IoT represents a persuasive opportunity across an astounding array of applications. When taken as a whole, the IoT can potentially transform nearly every aspect of how we live...
An Improved Security Approach For User authentication
A Key logger is software intended to imprison all of a user’s keyboard strokes, and then create use of them to mimic a user in financial transactions. Threats next to electronic and financial services can be secret in...