Mobile ad-hoc network (MANET) is very sensitive network to security due to challenging characteristic such as decentralization, dynamic changing topology, and neighbor based routing. All existing MANET protocol are simply trust their neighbor and make route through them due to neighbor based routing network is disturbed by malicious node or intruder. Trust calculation is challenging task due to computation complexity constraints in MANET. In this paper we have presented variants of trust based security protocol in an on demand distance vector routing protocol and also proposed new mechanism for Network coding with RSA based Encryption and Decryption in an AODV which will improve the security level of MANET with acceptable overhead limit.
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round -robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man -in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring
attack risk if a very small amount of information is exchanged. It raises the bar on the standards of
information security, ensuring more efficiency.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
http://www.skyriver.net/ - Skyriver Communications – Fixed Wireless Security. Skyriver is a leading business ISP, specializing in Fixed Wireless. Learn about Skyrivers’ innovative high performance broadband for business visit the site now.
Abstract— nowadays it is important to consider data security and
the effectiveness of securing data. There are various research studies
have been conducted relating to secure data field. However; due to
the increased of security requirement and the increase influence on
information exchange, a new secure QR code based RSA encryption
method is introduced. This paper illustrates a QR code system based
RSA algorithm, which can be used for bank customers to share their
data in secure way. The users will need to scan the code and acquire
their information which is stored in QR code. The paper explains the
high level implementation details of the proposed system.
Additionally, it deliberates how the system verifies for each user
identity to eliminate false registrations.
Keywords—QR Code; RSA algorithm; Bank System
Bluetooth technology is an emerging wireless networking standard, which is based on chip that provides short-range wireless frequency hopping communication. Now, Bluetooth technology is mainly applied to the communication between mobile terminal devices, such as palm computers, mobile phones, laptops and so on. However, the phenomenon of data-leaking frequently arises in using the Bluetooth technology for data transfer. To enhance the security of data transmission in Bluetooth communication, a hybrid encryption algorithm based on DES and RSA is proposed. The currently used encryption algorithm employed by the Bluetooth to protect the confidentiality of data during transport between two or more devices is a 128-bit symmetric stream cipher called E0. The proposed hybrid encryption algorithm, instead of the E0 encryption, DES algorithm is used for data transmission because of its higher efficiency in block encryption, and RSA algorithm is used for the encryption of the key of the DES because of its management advantages in key cipher. Under the dual protection with the DES algorithm and the RSA algorithm, the data transmission in the Bluetooth system will be more secure. This project is extended with triple des in place of des to enhance more security.
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round -robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man -in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring
attack risk if a very small amount of information is exchanged. It raises the bar on the standards of
information security, ensuring more efficiency.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
http://www.skyriver.net/ - Skyriver Communications – Fixed Wireless Security. Skyriver is a leading business ISP, specializing in Fixed Wireless. Learn about Skyrivers’ innovative high performance broadband for business visit the site now.
Abstract— nowadays it is important to consider data security and
the effectiveness of securing data. There are various research studies
have been conducted relating to secure data field. However; due to
the increased of security requirement and the increase influence on
information exchange, a new secure QR code based RSA encryption
method is introduced. This paper illustrates a QR code system based
RSA algorithm, which can be used for bank customers to share their
data in secure way. The users will need to scan the code and acquire
their information which is stored in QR code. The paper explains the
high level implementation details of the proposed system.
Additionally, it deliberates how the system verifies for each user
identity to eliminate false registrations.
Keywords—QR Code; RSA algorithm; Bank System
Bluetooth technology is an emerging wireless networking standard, which is based on chip that provides short-range wireless frequency hopping communication. Now, Bluetooth technology is mainly applied to the communication between mobile terminal devices, such as palm computers, mobile phones, laptops and so on. However, the phenomenon of data-leaking frequently arises in using the Bluetooth technology for data transfer. To enhance the security of data transmission in Bluetooth communication, a hybrid encryption algorithm based on DES and RSA is proposed. The currently used encryption algorithm employed by the Bluetooth to protect the confidentiality of data during transport between two or more devices is a 128-bit symmetric stream cipher called E0. The proposed hybrid encryption algorithm, instead of the E0 encryption, DES algorithm is used for data transmission because of its higher efficiency in block encryption, and RSA algorithm is used for the encryption of the key of the DES because of its management advantages in key cipher. Under the dual protection with the DES algorithm and the RSA algorithm, the data transmission in the Bluetooth system will be more secure. This project is extended with triple des in place of des to enhance more security.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
Confidentiality & Authentication Mechanism for Biometric Information Transmit...IJNSA Journal
The security of bio-metric information – finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficient and effective mechanism for confidentiality and authentication for biometric information transmitted by using arithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed of encryption, decryption and authentication process. It uses arithmetic encoding scheme and public key cryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially
transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and
software function, characteristics, features, operational procedures, accountability, access control, and administrative and management
policy. Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together
provide the fundamentals for trusted e-commerce and secure communication. There is a broad range of cryptographic algorithms that
are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving
more advanced techniques for secures communication.
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
A broad variety of wireless data applications and services depend on security. This paper presents a
simulation-based study of a wireless communication system using a secured Vigenere cipher and the RSA
cryptographic algorithms on text message transmission. The system under consideration uses 1/2-rated
CRC channel coding and BPSK digital modulation over an Additive White Gaussian noise (AWGN)
channel. To address security concerns, a text message is encrypted at the transmitter with the Vigenere
cipher and RSA before being decrypted and compared for different levels of SNR at the receiver end. To
carry out the computer simulation, the Matlab 2016a programming language has been used. The
transmitted text message is successfully retrieved at the receiver end after the Vigenere cipher and the RSA
cryptographic algorithm are implemented. It is also anticipated that as noise power increases, the
effectiveness of a wireless communication system based on the Vigenere cipher and RSA security will
decrease.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper we present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into nonlinear equations using public key and decipher by the intended party using private key. If a third party intercepted the message, it will be difficult to decipher it due to the multilevel ciphers of the proposed application.
Cryptography is a technique used today hiding any confidential information from the attack of an intruder. Today data communication mainly depends upon digital data communication, where prior requirement is data security, so that data should reach to the intended user. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with many encryption techniques. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are analyzed. Also in this paper, a survey on existing work which uses different techniques for image encryption is done and a general introduction about cryptography is also given. This study extends the performance parameters used in encryption processes and analyzing on their security issues.
Our wish here is to present some functional components, which are essential to the implementation of cryptographic protocols, such as those underlying the BlockChain.
BeeBryte - Energy Intelligence & Automation
www.beebryte.com
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONadeij1
Cloud storage services are a lot of well-liked today . To secure information from those that don't have access, several encoding schemes are projected. Most of the projected schemes assume cloud storage service suppliers or trustworthy third parties handling key management are trustworthy and can't be hacked; but, in follow, some entities could intercept communications between users and cloud storage suppliers and so compel storage suppliers to unleash user secrets by victimisation government power or alternative means that. During this case, encrypted information are assumed to be identified and storage suppliers are requested to unleash user secrets. Since it's tough to fight against outside coercion, we tend to aimed to create Associate in Nursing encoding theme that might facilitate cloud storage suppliers avoid this plight. We provide cloud storage suppliers means that to make pretend user secrets. Given such pretend user secrets, outside coercers will solely obtained solid information from a user’s keep cipher text. Once coercers suppose the received secrets are real, they'll be happy and a lot of significantly cloud storage suppliers won't have discovered any real secrets. Therefore, user privacy continues to be protected.
Our wish here is to present some functional components, which are essential to the implementation of cryptographic protocols, such as those underlying the BlockChain.
BeeBryte - Energy Intelligence & Automation
www.beebryte.com
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
In the military devices there is need to transmission of data security and fast. These proposed technique presents the secure,
efficient and fast way to send images using Identity Based Cryptography and Visual Cryptography. In this application Identity Based
Cryptography is used with Visual cryptography. In Identity based cryptography the RSA Cryptosystem is used to generate public and
private key by using Ancient Indian Mathematics for fast mathematical calculation. RSA is the safest and standard algorithm. Vedic
method is so efficient in multiplication terms of area, speed compered to its modern mathematics implementation. The regeneration of
public/private key is adopted to make the system more secure from various attacks.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
Confidentiality & Authentication Mechanism for Biometric Information Transmit...IJNSA Journal
The security of bio-metric information – finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficient and effective mechanism for confidentiality and authentication for biometric information transmitted by using arithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed of encryption, decryption and authentication process. It uses arithmetic encoding scheme and public key cryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially
transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and
software function, characteristics, features, operational procedures, accountability, access control, and administrative and management
policy. Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together
provide the fundamentals for trusted e-commerce and secure communication. There is a broad range of cryptographic algorithms that
are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving
more advanced techniques for secures communication.
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
A broad variety of wireless data applications and services depend on security. This paper presents a
simulation-based study of a wireless communication system using a secured Vigenere cipher and the RSA
cryptographic algorithms on text message transmission. The system under consideration uses 1/2-rated
CRC channel coding and BPSK digital modulation over an Additive White Gaussian noise (AWGN)
channel. To address security concerns, a text message is encrypted at the transmitter with the Vigenere
cipher and RSA before being decrypted and compared for different levels of SNR at the receiver end. To
carry out the computer simulation, the Matlab 2016a programming language has been used. The
transmitted text message is successfully retrieved at the receiver end after the Vigenere cipher and the RSA
cryptographic algorithm are implemented. It is also anticipated that as noise power increases, the
effectiveness of a wireless communication system based on the Vigenere cipher and RSA security will
decrease.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper we present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into nonlinear equations using public key and decipher by the intended party using private key. If a third party intercepted the message, it will be difficult to decipher it due to the multilevel ciphers of the proposed application.
Cryptography is a technique used today hiding any confidential information from the attack of an intruder. Today data communication mainly depends upon digital data communication, where prior requirement is data security, so that data should reach to the intended user. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with many encryption techniques. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are analyzed. Also in this paper, a survey on existing work which uses different techniques for image encryption is done and a general introduction about cryptography is also given. This study extends the performance parameters used in encryption processes and analyzing on their security issues.
Our wish here is to present some functional components, which are essential to the implementation of cryptographic protocols, such as those underlying the BlockChain.
BeeBryte - Energy Intelligence & Automation
www.beebryte.com
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONadeij1
Cloud storage services are a lot of well-liked today . To secure information from those that don't have access, several encoding schemes are projected. Most of the projected schemes assume cloud storage service suppliers or trustworthy third parties handling key management are trustworthy and can't be hacked; but, in follow, some entities could intercept communications between users and cloud storage suppliers and so compel storage suppliers to unleash user secrets by victimisation government power or alternative means that. During this case, encrypted information are assumed to be identified and storage suppliers are requested to unleash user secrets. Since it's tough to fight against outside coercion, we tend to aimed to create Associate in Nursing encoding theme that might facilitate cloud storage suppliers avoid this plight. We provide cloud storage suppliers means that to make pretend user secrets. Given such pretend user secrets, outside coercers will solely obtained solid information from a user’s keep cipher text. Once coercers suppose the received secrets are real, they'll be happy and a lot of significantly cloud storage suppliers won't have discovered any real secrets. Therefore, user privacy continues to be protected.
Our wish here is to present some functional components, which are essential to the implementation of cryptographic protocols, such as those underlying the BlockChain.
BeeBryte - Energy Intelligence & Automation
www.beebryte.com
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
In the military devices there is need to transmission of data security and fast. These proposed technique presents the secure,
efficient and fast way to send images using Identity Based Cryptography and Visual Cryptography. In this application Identity Based
Cryptography is used with Visual cryptography. In Identity based cryptography the RSA Cryptosystem is used to generate public and
private key by using Ancient Indian Mathematics for fast mathematical calculation. RSA is the safest and standard algorithm. Vedic
method is so efficient in multiplication terms of area, speed compered to its modern mathematics implementation. The regeneration of
public/private key is adopted to make the system more secure from various attacks.
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
Transferring the secure data becomes vital for the important data of every days life. The system is a secure data transferring, combining the two techniques, Advance Encryption Standard AES and RSA. The data file is encrypted by using AES with the randomly generated key. This key is also encrypted by RSA using the receivers public key. The encrypted data file and encrypted key file are combined to form an output file to send to the receiver. The file at the receivers side is separated into two files, the encrypted data file and encrypted key file. The encrypted key file is decrypted by RSA method using the receivers private key. The AES key is acquired, the encrypted data file is then decrypted by AES method using the acquired AES key. The system includes file transferring process based on the Java socket technology. Khet Khet Khaing Oo | Yan Naung Soe "Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29243.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29243/encryption-data-measurement-and-data-security-of-hybrid-aes-and-rsa-algorithm/khet-khet-khaing-oo
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...ijcisjournal
In this paper, we present an improved Paillier Cryptosystem for a secured data transmission based on the
Residue Number System (RNS). The current state of Paillier Cryptosystem allows the computation of the
plaintext from the cipher text without solving its security assumption of Decisional Composite Residuosity
or the knowledge of its private keys under mathematical attacks
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORKijesajournal
It is well known that Named Data networking ensure data integrity so that every important data has to be
signed by its owner in order to send it safely inside the network. Similarly, in NDN we have to assure that
none could open the data except authorized users. Since only the endpoints have the right to sign the data
or check its validity during the verification process , we have considered that the data could be requested
from various types of devices used by different people, these devices could be anything like a smartphone,
PC, sensor node etc.b, with a different CPU descriptions, parameters, and memory sizes, however their
ability to check the high traffic of a data during the key generation and/or verification period is definitely a
hard task and it could exhaust the systems with low computational resources. RSA and ECDSA as digital
signature algorithms have proven their efficiency against cyber-attacks, they are characterized by their
speed to encrypt and decrypt data, in addition to their competence at checking the data integrity. The main
purpose of our research was to find the optimal algorithm that avoids the system’s overhead and offers the
best time during the signature scheme
Cryptography is a technique or method for securing communications by using codes, so that the third parties cannot use that sensitive information and only intended users can read and process it. To avoid such things encryption and decryption is the solution for the same, which will ensure confidentiality, integrity, prevent information from tampering, forgery and counterfeiting. For encryption decryption process, we require a key it is mandatory that key should not be leaked, hence for this purpose we use private and public key which is only known by the receiver and sender. This paper proposes complete implementation of RSA text encryption decryption as well as image encryption decryption. Dr. C. Umarani | Aditi Badnore "RSA Cryptosystem using Python" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35752.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35752/rsa-cryptosystem-using-python/dr-c-umarani
Chapter 8Secure Transport LayerIn the early days of thJinElias52
Chapter 8
Secure Transport Layer
In the early days of the Internet, networks were small and all of
the routers were in secure locations. As long as each computer
connected to the Internet protected itself from unwanted incom-
ing connections, it was felt that there was no need to protect data
from prying eyes while it was crossing the network.
So the Link, Internetwork, and Transport layers were focused on
the efficient movement of data and solving the problems of a
large-scale shared distributed network without worrying about
the privacy of that data.
But as the use of the Internet grew rapidly in the late 1980s and
literally exploded when the Web became mainstream in 1994, se-
curity and privacy of network traffic became very important prob-
lems to solve. When we began using the Internet to conduct com-
merce and credit cards and bank account numbers were being
routinely sent across the network, securing data became essen-
tial. And when we started using wireless technologies like WiFi,
security became necessary for even the simplest uses of the In-
ternet.
There are two general approaches to securing network activity.
The first makes sure that all of the network hardware (routers
and links) is in physically secure locations so it is not possible for
someone to sneak in and monitor traffic while it is crossing the
Internet. This approach is not practical for hundreds of thousands
of network routers owned and operated by many different orga-
nizations. While you might be able to ensure that some of the
router operators adhered to strict security procedures and poli-
cies, sooner or later a mistake will be made. And once WiFi was
added to the mix and your packets went over radio waves, a net-
work attacker could just sit in a coffee shop and intercept packets
89
90 CHAPTER 8. SECURE TRANSPORT LAYER
as they passed through the air.
Under these conditions, the only reasonable solution is to encrypt
data in your computer before it is sent across its first physical
link, and then decrypt the data in the destination computer after
it arrives. Using this approach, we assume that an attacker can
see all of the packets that you send, but they cannot decrypt the
data that they have captured. The encryption also guarantees
that there is no way to alter your data while it is crossing the
Internet.
8.1 Encrypting and Decrypting Data
The concept of protecting information so it cannot be read while
it is being transported over an insecure medium is thousands of
years old. The leaders in Roman armies sent coded messages to
each other using a code called the “Caesar Cipher”. The simplest
version of this approach is to take each of the characters of the
actual message (we call this “plain text”) and shift each charac-
ter a fixed distance down the alphabet to produce the scrambled
message or “ciphertext”.
Then we send the ciphertext via the courier or other insecure
transport to the other person. The couri ...
Encryption is a fundamental concept in cryptography that involves the process of converting plaintext (readable and understandable data) into ciphertext (encoded and unintelligible data) using a mathematical algorithm and an encryption key. The primary purpose of encryption is to ensure the confidentiality and privacy of sensitive information during transmission or storage.
In the encryption process:
1. **Plaintext:** This is the original, readable data that is to be protected. It could be a message, a file, or any form of digital information.
2. **Encryption Algorithm:** An encryption algorithm is a set of mathematical rules and procedures that transform the plaintext into ciphertext. Common encryption algorithms include Advanced Encryption Standard (AES), RSA, and Triple DES.
3. **Encryption Key:** The encryption key is a piece of information used by the encryption algorithm to perform the transformation. The key determines the specific pattern and method by which the plaintext is converted into ciphertext. The strength of the encryption often depends on the length and randomness of the key.
4. **Ciphertext:** This is the result of the encryption process—the transformed and encoded data that appears random and is indecipherable without the corresponding decryption key.
Encryption serves several important purposes in the field of cryptography:
- **Confidentiality:** The primary goal of encryption is to keep information confidential and secure from unauthorized access. Even if an unauthorized party intercepts the ciphertext, they should be unable to understand or decipher it without the correct decryption key.
- **Integrity:** Encryption helps ensure the integrity of data by providing a means to detect any unauthorized modifications. If the ciphertext is altered, the decryption process will produce incorrect results, alerting the recipient to potential tampering.
- **Authentication:** In some encryption scenarios, the use of digital signatures or authenticated encryption helps verify the origin and authenticity of the encrypted data.
- **Secure Communication:** Encryption is widely used to secure communication over networks, such as the internet. Protocols like HTTPS (HTTP Secure) use encryption to protect the confidentiality of data transmitted between a web browser and a web server.
- **Data-at-Rest Protection:** Encryption is applied to data stored on devices or servers, ensuring that even if physical access is gained, the data remains protected from unauthorized viewing.
In summary, encryption is a crucial tool in the field of cryptography, providing a means to safeguard the confidentiality, integrity, and authenticity of sensitive information in various digital environments.
Due to availability of internet and evolution of embedded devices, Internet of things can be useful to contribute in energy domain. The Internet of Things (IoT) will deliver a smarter grid to enable more information and connectivity throughout the infrastructure and to homes. Through the IoT, consumers, manufacturers and utility providers will come across new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs and connected appliances. The future smart home, various devices will be able to measure and share their energy consumption, and actively participate in house-wide or building wide energy management systems. This paper discusses the different approaches being taken worldwide to connect the smart grid. Full system solutions can be developed by combining hardware and software to address some of the challenges in building a smarter and more connected smart grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
Internet of things (IoT) is the most powerful invention and if used in the positive direction, internet can prove to be very productive. But, now a days, due to the social networking sites such as Face book, WhatsApp, twitter, hike etc. internet is producing adverse effects on the student life, especially those students studying at college Level. As it is rightly said, something which has some positive effects also has some of the negative effects on the other hand. In this article, we are discussing some adverse effects of IoT on student’s life.
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
The use of information and communications technology (ICT) in education is a relatively new phenomenon and it has been the educational researchers' focus of attention for more than two decades. Educators and researchers examine the challenges of using ICT and think of new ways to integrate ICT into the curriculum. However, there are some barriers for the teachers that prevent them to use ICT in the classroom and develop supporting materials through ICT. The purpose of this study is to examine the high school English teachers’ perceptions of the factors discouraging teachers to use ICT in the classroom.
In recent years usage of private vehicles create urban traffic more and more crowded. As result traffic becomes one of the important problems in big cities in all over the world. Some of the traffic concerns are traffic jam and accidents which have caused a huge waste of time, more fuel consumption and more pollution. Time is very important parameter in routine life. The main problem faced by the people is real time routing. Our solution Virtual Eye will provide the current updates as in the real time scenario of the specific route. This research paper presents smart traffic navigation system, based on Internet of Things, which is featured by low cost, high compatibility, easy to upgrade, to replace traditional traffic management system and the proposed system can improve road traffic tremendously.
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence†by Tempus project PROMIS.
Understanding IoT Management for Smart Refrigeratorijsrd.com
Lately the concept of Internet of Things (IoT) is being more elaborated and devices and databases are proposed thereby to meet the need of an Internet of Things scenario. IoT is being considered to be an integral part of smart house where devices will be connected to each other and also react upon certain environmental input. This will eventually include the home refrigerator, air conditioner, lights, heater and such other home appliances. Therefore, we focus our research on the database part for such an IoT’ fridge which we called as smart Fridge. We describe the potentials achievable through a database for an IoT refrigerator to manage the refrigerator food and also aid the creation of a monthly budget of the house for a family. The paper aims at the data management issue based on a proposed design for an intelligent refrigerator leveraging the sensor technology and the wireless communication technology. The refrigerator which identifies products by reading the barcodes or RFID tags is proposed to order the required products by connecting to the Internet. Thus the goal of this paper is to minimize human interaction to maintain the daily life events.
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design.
A Review: Microwave Energy for materials processingijsrd.com
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability.
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both.
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
In day today's relevance, it is mandatory to device the usage of diesel in an economic way. In present scenario, the very low combustion efficiency of CI engine leads to poor performance of engine and produces emission due to incomplete combustion. Study of research papers is focused on the improvement in efficiency of the engine and reduction in emissions by adding ethanol in a diesel with different blends like 5%, 10%, 15%, 20%, 25% and 30% by volume. The performance and emission characteristics of the engine are tested observed using blended fuels and comparative assessment is done with the performance and emission characteristics of engine using pure diesel.
Study and Review on Various Current Comparatorsijsrd.com
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Review on variants of Security aware AODV
1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 3, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 443
Review on variants of Security aware AODV
Jatin Baldania1
Prof. Jitendra Bhatia2
1
Alpha College of Engg and Technology , Khatraj, Ahmadabad 382 481, India
2
Nirma University of Science & Technology, Ahmadabad 382 481, India
Abstract— Mobile ad-hoc network (MANET) is very
sensitive network to security due to challenging
characteristic such as decentralization, dynamic changing
topology, and neighbor based routing. All existing MANET
protocol are simply trust their neighbor and make route
through them due to neighbor based routing network is
disturbed by malicious node or intruder. Trust calculation is
challenging task due to computation complexity constraints
in MANET. In this paper we have presented variants of trust
based security protocol in an on demand distance vector
routing protocol and also proposed new mechanism for
Network coding with RSA based Encryption and Decryption
in an AODV which will improve the security level of
MANET with acceptable overhead limit..
I. INTRODUCTION
Ad hoc networks are becoming central research area due to
decentralization, mobility of node, temporary network life
and neighbor based routing. However all features of ad hoc
network make security and trust problem more serious.
Traditional security mechanism for providing
confidentiality, authentication and availability are not
efficient in ad hoc networks where network nodes have
limited communication bandwidth, CPU cycles, and
memory and battery capacity. Ad hoc nodes are describing
by minimum trust each other. This requires an efficient
protocol for finding secure end-to-end routes, free of non-
trusted nodes. Most of the work on routing security focus on
the efficient use of digital signature or shared secret key or
public key infrastructure to authenticate and confide data
and routing headers. They always tend to find shortest path
between source and destination irrespective of presence of
malicious nodes in between. Earlier design extension of T-
AODV (trust embedded) secure routing protocol capable of
withstanding with independent malicious node or multiple
malicious node acting in collusion. This protocol use
existence public key infrastructure for key generation
(public key, private key) pair for every node to handling
colluding attack using existing algorithm. Due to
continuously trust calculation as well as this public key
infrastructure of generating encryption and decryption can
degrade the performance of protocol.
To overcome this Problem, we have proposed new
protocol that is Networking coding with RSA based
encryption and decryption can take care of this problem.
Network coding is a method of optimizing the flow of
digital data in a network by transmitting digital evidence
about messages. The “digital evidence” is itself, a composite
of two or more messages. When the bits of digital evidence
arrive at the destination, the transmitted message is deduced
rather than directly reassembled. In a traditional packet-
switched network, data flows is defined as discrete “pieces”
from the source to destination like corpuscles in the
bloodstream. At the transmitting station, the outgoing
message is broken into packets ,each of which contains
some of the message data intact. The packets do not
necessarily all travel along the same route but they all
eventually arrive at the same destination, where the
receiving computer reassembles them into the original
message. The main problem with this method is that when
the overall network traffic volume is high, resulting in long
delay. But in case of network coding, instead of directing
the packets towards their final destination, coders transmit
metadata in the form digital evidence about the message
along multiple paths simultaneously. Metadata arriving from
two or more source may be combined into single packets. In
network coding, the data does not depend only on one
transmitted message but also on the contents of the other
messages that happen to be sharing the route at the time of
transmission. For this reason, network coding is more
resistant to hacking, eavesdropping and other forms of
attack than traditional transmission.
RSA is a public key algorithm. A message can be
encrypted by either public key or private key of RSA. If a
message is encrypted with the private key, then that act is
called signing the message. Therefore, RSA is one of the
Digital Signature algorithms. RSA was named after its three
inventors: Ron Rivest, Adi Shamir, and Leonard Adleman.
It has become very popular, people have a level of
confidence in using it, and it is a de facto standard in much
of the world. The security of it is drawn from factoring large
numbers.
To generate public key and private key, choose two
large prime numbers p and q with equal size (equal size for
maximum security), then compute:
n = p * q (1.4)
Then choose a random number e (as a part of public key)
such that e and (p-1) (q-1) are relatively prime, this will
ensure the equation below has a solution. Then, private key
d can be computed by using extended Euclidean algorithm:
e d ≡ 1 mod (p-1)(q-1) (1.1)
So the public key is e and n, and the private key is d. Two
prime numbers p and q are gone after finding d, and they
should be discarded for security reason. To encrypt a
message m, m should be broken up into numerical blocks mi
smaller than n. With binary data, choose the largest power
of 2 less than n. That is, if both p and q are 100-digit
primes, then n will have just under 200 digits and each
2. Review on variants of Security aware AODV
(IJSRD/Vol. 1/Issue 3/2013/0011)
All rights reserved by www.ijsrd.com
444
message block, mi, should be just under 200 digits long.To
encrypt each block mi
ci = mi e mod n (1.2)
To decrypt each block of cipher text:
mi = cid mod n (1.3)
This message could be encrypted with private key d, and
decrypt it with public key e and n. If keys are used in this
manner, the act of encrypting the message with private key d
is called signing the message. RSA is used for many other
Digital Rights Management (DRM) applications.
The mathematical details of the algorithm used in obtaining
the public and private keys are available at the RSA Web
site. Briefly, the algorithm involves multiplying two large
prime numbers (a prime number is a number divisible only
by that number and 1) and through additional operations
deriving a set of two numbers that constitutes the public key
and another set that is the private key. Once the keys have
been developed, the original prime numbers are no longer
important and can be discarded. Both the public and the
private keys are needed for encryption /decryption but only
the owner of a private key ever needs to know it. Using the
RSA system, the private key never needs to be sent across
the network.
The private key is used to decrypt text that has
been encrypted with the public key. Thus, if I send you a
message, I can find out your public key (but not your private
key) .In addition to encrypting messages (which ensures
privacy), you can authenticate yourself to me (so I know that
it is really you who sent the message) by using your private
key to encrypt a digital certificate. When I receive it, I can
use your public key to decrypt it.
The security of the RSA Algorithm is based on the
belief that factoring large integers is and will continue to be
computationally expensive. RSA has been in use for more
than 30 years and to this day is still considered secure,
provided keys of sufficient length are used. Keys created
today are typically at least 2048 bits Many codes have been
broken and many codes will continue to be broken. The idea
that it must be safe because it’s so hard to break could fall
apart tomorrow if someone figured out a way to factor large
integers efficiently. However, if a way to factor large
integers efficiently was found, it would be a huge milestone
in Mathematics, unfolding more mysteries. Other
asymmetric cryptography algorithms which are not based on
the factoring problem exist.
Digital signatures are a means of signing electronic
documents. As the world becomes more digital and people
begin to move to digital workflows, such online banking and
online routing of forms, digital signatures will play a more
important role. It would be inconvenient to fill out all of
information online, and then one has to send a piece of
paper which contains his or her signature through post
office. Since people will be able to digitally sign a
document, digital signatures must be secure so that people
can be sure that the person who signed the document was
who they said they were. To sign a document a person must
have something to uniquely identify himself or herself, that
is something only he or she has it and use it. Moreover,
people have to be able to verify the signature which comes
from the person who signed. Some public key cryptography
offer that need. They have 2 keys: a private key for signing
and a public key for verification in case of digital signature.
Some public key algorithms have already been used in
implementation of the digital signature, and one of most
popular public key algorithms is RSA. It's not governed by
any active patents. Anyone can use it, royalty free in any
private or commercial product. RSA can do encryption,
decryption, signature and signature verification -- all with
the same two functions. It has been around for more than 30
years and has not been compromised.
The goal of this paper is to review basic variants of
Security aware AODV protocol.
II. VARIANTS OF AODV PROTOCOL
Collaborative trust against Colluding attack in AODVA.
T-AODV (Trust Embedded) routing was designed to find
secure end-to-end path free of independent malicious node
but failed to handle attack by multiple malicious node acting
in collusion. In this paper, Extension of T-AODV protocol is
able to handle either the attack by multiple malicious node
acting in collision or independent malicious node. In this
algorithm, assumes the existence of public key
infrastructure. In this algorithm, each node calculates trust
level as well as MAC (message authentication code) and
attaches it to the RREQ packet header. MAC of current node
can be calculated as combining the trust level of predecessor
node, IP address of current node and sign with private key to
compute the MAC. Whenever any node raise doubt about
other node’s trustworthiness then, that node broadcast
RWARN (route warning message) including IP address of
accused node as well as MAC. Receiving node of RWARN
message verifies the accusation of the sender of the message
then, it decrypt the MAC with public key of accused node,
if decryption is done then, Check the trust level of accused
node and accuser node and match them, if they match then,
Accuser is malicious else accused node is malicious. If
decryption is not done then accuser is malicious node.
From this algorithm, we concluded that use of
public key infrastructure destroying the self-organizing
nature of mobile Ad hoc network and also improvement in
overhead of decryption.
Securing AODV using Node trust and route trustB.
In this paper, trust based routing protocol gives equal
attention to both node trust as well as route trust calculation
to provide tight security to MANETs. T-AODV is
modification of existing AODV protocol that only calculates
node’s trust values but in few situations it is not sufficient to
create secure route. For that we also need to focus equally
on route trust calculation because after successful route
establishment source node may not aware of the current
route conditions [8]. AODV RREP does not contain any
information by which we can detect status of route. For
solving this problem, Trust based routing protocol equally
focus on both node trust and route trust calculation.
3. Review on variants of Security aware AODV
(IJSRD/Vol. 1/Issue 3/2013/0011)
All rights reserved by www.ijsrd.com
445
Node trust calculation process: New data structure
as neighbor table, which is used for keep tracks dynamically
moving neighbor-list and related node’s trust value, is
introduced in addition to routing table in each node of
MANETs. Calculation of node trust is done by taking
opinions of all neighbors and final trust value is placed in
the trust value field of neighbor table. Every event of node
having some trust value, by combining trust value of all
events of node, we can assign individual weight to
determine the aggregate trust level for another node.
Route trust calculation process: In this process,
existing routing table is modified by inserting route trust
field, which is computed by every node for each route. Each
route already having the entry for number of packets sent to
the corresponding destination route. Route trust calculation
can be done by number of packets sent by the node minus
number of received by destination. If route trust value is
zero, then route is secure or perfect one otherwise it indicate
that originated packets cannot reach the destination due to
traffic or network problem.
Trust Based Security Framework for Pure AODVC.
This trust based Framework find misbehaving node or
malicious node in ad hoc on demand distance vector routing
protocol, each node calculate trust level of its neighboring
node for route selection. Each node working as monitoring
node with dynamic behavior and calculate trust level of its
neighboring node as it increase or decrease trust level of
neighboring node depending on their behavior .Normally
there will be three kind of trust level Min ,Max and
Nominal. Suppose monitoring node A calculate the trust
level of its neighboring node B as Monitoring node A
Calculate trust level of B using Combination of two things(
i)Monitoring node directly calculate trust level of B through
mix Mode i.e. monitoring node Directly observe the
different behavior of node B such as network and Mac layer
acknowledgement, route request(RREQ),route
Reply(RREP) and Error Message(ii) Monitoring node
calculate trust level of B Node using opinion of the others
node’s about B. Trust based Security framework also
consider circumstance where Node B is not forwarding data
as expected by A if its cause is low battery power and high
traffic, this does not imply that b is malicious node and its
trust value should not be decremented. It will be
decremented only if its packets drop rate (PDR) crosses
packet threshold, it is evaluated to achieve maximum
efficiency.
To handle impersonation attack, monitoring node
will check the packets forwarded by its neighbor node for
packet integrity after time (Delta t). To handle the
impersonation attack, monitoring node calculate trust level
by combining two type of opinion (i) Monitoring node
calculate trust level of B node based on direct neighbor of
monitoring node and that is 90% opinion (ii) monitoring
node calculate the trust level of B node Based on indirect
neighbor of monitoring node and opinion consider to be
only 10 % of that node.
Secure AODV by real-time Host Intrusion detectionD.
Real-time host intrusion detection for ad hoc networks used
to recognize flooding attacker node and take suitable action
against it to minimize the effectiveness of attack and retain
the network performance within accepted limit in the ad hoc
flooding attack node, which has got attack violate the
operation rules of RREQ packet to finish the network
resource. Attacker select IP addresses, which is not exist in
network, if they know the scopes of the IP addresses
otherwise they select random ip addresses, if they don’t
know the scope of the IP addresses. Attacker continuously
creating and sending mass RREQ messages for unknown
(void) IP addresses, attacker tries to send excessive RREQ
without considering RREQ_RATE_LIMIT per second.
Attacker will resend the RREQ packets without waiting for
the RREP or round trip time, if he use out theses IP
addresses. TTL of RREQ is set up to the maximum without
using expanding ring search method. In the flooding attack,
the whole network will be full of RREQ packets that
attackers sends due to this flooding attack, communication
bandwidth and resource of nodes of the network exhausted
at same time.
REHIDAN algorithm is to detect the flooding
attack against the AODV routing protocol and isolate the
attacker nodes, This algorithm use knowledge based
methodology to detect network intrusions, It makes the
system in such way that it detect malicious or attacker’s
activity in real time rather than using statistical analysis of
already captured traffic, This algorithm determine the attack,
when it is in progress.
Multi-agent Information Fusion Based trust in AODVE.
With fast growing and due to challenging characteristics of
ad hoc mobile network, security and trust is concern to
network. In this paper, to collect different information
regarding different behavior of node via different type of
agent , which is used to monitor the behavior of node and
according to it, collect trust information for that node ,
which assigned by system to each factor such as behavior of
node ,residual energy of node and hop number .so different
behavior will have different metrics so we need to unified
trust routing metrics to do that we need to normalized
different metrics and then multiplied by weighting factor
and then they are accumulated to the unified trust routing
metrics. If Routing trust evaluation values are greater, then
that route has high degree trust. In this trust worthy routing
framework , node which having high degree of trust can be
participate in network , so by which security can enhanced.
In this trust routing framework, multi-source information
fusion application has been used to get multi information
from node’s internal and external factors. Multi-agent
system (MAS) is systems composed of multiple interacting
intelligent agents, who can be used to solve the problem
which cannot be solved by individual agent and it also
maintain the self-organization nature of network. Four
different agents such as hop number agent, node energy
agent, node behavior and information fusion agent, these the
entire agent used to cooperate to compute trust routing
metrics values.
4. Review on variants of Security aware AODV
(IJSRD/Vol. 1/Issue 3/2013/0011)
All rights reserved by www.ijsrd.com
446
The Ad hoc On-Demand distance Vector (AODV)
algorithm having dynamic, self-starting, neighbor based
routing in ad hoc networks. There are three types of
messages such as Route Requests(RREQs), Route
Replies(RREPs) and Route Errors(RERRs) defined by
AODV. To make trust AODV routing protocol, RREP
should be modified to meet the trust routing need. In
addition to regular information of RREP packet, we
accumulated internal factor value, which express residual
energy value of the nodes in the route and accumulated
external factor value, which express previous node behavior
evaluation condition.
Direct and indirect trust Evaluation in AODVF.
In this algorithm, securing ad hoc network by using trust
mechanism, in which each node has its opinion about other
node’s trustworthiness, which are calculating by directly
communicating with other nodes or by combining other
nodes’ recommendations. This trust calculation can be
divided into two categories one is direct trust and other is
indirect trust. Total trust value of target node can be
computed as sum of direct trust value plus indirect trust
value. Based on this total trust value, other node will decide
that it will communicate or not. Direct trust will have more
importance from total trust than indirect trust. In direct trust
calculation, suppose node X having done number of positive
experience, which another node Z knows. By observing this
positive experience, Z will calculating trust about node X
that is direct trust calculation. In Indirect trust calculation,
suppose S is source node and D is destination node, from
source to destination node in between whatever node
coming in route will get trustworthiness value from their
neighboring node according to their interaction with their
corresponding node. In this algorithm, RREQ packets
contain two extra field PTL (previous node’s trust level) and
CTL (cumulative trust level) in addition to regular field. In
this, predecessor node checks all trust level information
provided by node to ensure security. when source node need
to find route to another node it broadcast RREQ packets
which contains encrypted ID of source with destination’s
public key and destination id which make sure that only
target node can unlock the information. When intermediate
node receive RREQ packet it include trust level of node that
sends its RREQ and increases the cumulative field of its
previous nodes. next-hop of intermediate check back after
rebroadcast RREQ that it has provided proper information
or not if not ,then it immediately broadcast warning message
that malicious actions of that node. RREQ packet
propagated through network and finally reaches to the
destination. Destination node checks that RREQ packet
coming to it is destined for it. Then it use private key to find
source node S. destination will select final route based on
maximum cumulative trust value. Hop count considering
only when more than one packet having same trust value.
After that destination node locally broadcast RREP packet
which contain public key of intermediate node they were
encoded when RREQ packet propagated toward destination.
when intermediate node receive RREP packet they try
decode it using their public key, if they failed then
discarded the RREP otherwise update their routing table and
at last it will remove their part and broadcast packets. In this
way, RREP is coming back to source node.
Trust Framework using IDSG.
In this T-AODV (trust embedded), we assume that the
system is equipped with some monitor mechanism or
intrusion detection units in network layer, so that every node
can observe behavior of its one hope neighbors. In this
framework of trusted AODV mainly contains three modules
(1) basic AODV routing protocol (2) trust model (3) trusted
AODV routing protocol which contains procedure such as
trust recommendation, trust combination, trust judging,
cryptographic routing behavior, trusted routing behaviors
and trust updating.
Initially, node use cryptographic scheme which is
proposed in secure AODV protocol to perform routing
discovery operations. After performing some
communication with other nodes as either successful or
failed based on it, node changes its opinion about other
nodes using trust updating algorithm. After establishing trust
relationship among nodes in network, these all nodes use
trusted based routing protocol based on trust model to
perform routing operations. Now node X will utilize the
trust recommendation protocol to give and receive trust
information about node Y from its neighbors then, it use
trust combination algorithm to combine all the
recommendation opinion together and compute new opinion
about Y. In this framework, routing discovery and trust
establishment process is done as self-organized way without
using third party’s interventions.
Intrusion detection algorithm: In this algorithm,
source node broadcasting RREP packets, which contain
security related information in addition to regular
information, to all its neighbors. Intermediate node received
RREP packet and put trustworthy information in it and
forward it to next hop. Process is repeat until final
destination is reach. Destination node waits for fixed
number of RREQs or particular time interval before making
routing decisions. Then destination node unicast the RREP
on reverse root back to source node then, source node start
to forwarding data packet by this route. During the
communication, Intermediate node keep eye on active route
of link status of next-hop, if proper trustworthy and
performance not found then, it eliminated that node from
route. Route error (RERR) packet is used to notify all other
nodes about link breakage when active route’s link breakage
is detected. This algorithm introduces less computation
overheads than other security scheme for MANETs.
REFERENCES
[1] Tirthnkar Ghosh,Niki Pissinou,Kia
Makki,"Collaborative trust based secure routing against
colluding malicious nodes in multi-hope ad hoc
network," Local Computer Networks, 29th Annual
IEEE International Conference on Nov 2004,pp. 224-
231,ISBN 0-7695-2260-2.
[2] A.Menaka Pushpa, “Trust based secure routing in
AODV routing protocol," Internet Multimedia Services
Architecture and Applications (IMSAA), IEEE
International Conference on Dec 2009,pp. 1-6,ISBN
978-1-4244-4792-3.
5. Review on variants of Security aware AODV
(IJSRD/Vol. 1/Issue 3/2013/0011)
All rights reserved by www.ijsrd.com
447
[3] Imran Raza and S.A. Hussain, " A Trust Based Security
Framework for Pure AODV network, “Information and
Emerging Technologies,ICIET International
Conference July 2007,pp. 1-6,ISBN 978-1-4244-1247-
1.
[4] Mohamed M. Ibrahim,Nayera Sadek , Mohamed EI-
Banna, " Prevention of flooding attack in wireless Ad-
Hoc AODV-based networks using real- time Host
intrusion detection (REHIDAN)," Wireless and Optical
Communications Networks,IFIP International
Conference on April 2009,pp. 1-5,ISBN 978-1-4244-
4704-6.
[5] Chen Hongsong and Fu Zhongchuan, “Multi-agent
Information Fusion Based Trust Routing Framework for
Mobile Ad hoc Network," Information Science and
Engineering (ICISE),2nd International Conference on
Dec 2010,pp. 1-4,ISBN 978-1-4244-7616-9.
[6] ZhiyaLIU, Shejie LU and Jun YAN, " Secure Routing
Protocol based Trust for Ad Hoc Networks," Eighth
ACIS International Conference on Software
Engineering, Artificial Intelligence, Networking, and
Parallel/Distributed Computing, 2007,pp. 279-
283,ISBN 978-0-7695-2909-7.
[7] Pankaj Sharma, Yogendra Kumar Jain, “Trust based
secure AODV in MANET," Journal of Global
Research in computer Science June 2012, Volume 3,
ISSN-2229-371x.