SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 971
REFINING DATA SECURITY IN INFRASTRUCTURENETWORKS
SUPPORT OF MULTIPATH ROUTING
K. Karnavel1
, L. shalini2
, M. Ramananthini3
1
Assistant Professor, 2,3
PG Student, Department of Computer Science & Engineering, AIHT, Chennai
treseofkarnavel@gmail.com
Abstract
An infrastructure network is a self-organizing network with help of Access Point (AP) of wireless links connecting nodes to another.
The nodes can communicate without an ad hoc. They form an uninformed topology(BSS/ESS), where the nodes play the role of routers
and are free to move randomly. Infrastructure networks proved their efficiency being used in different fields but they are highly
vulnerable to security attacks and dealing with this is one of the main challenges of these networks at present.In recent times some
clarification are proposed to provide authentication, confidentiality, availability, secure routing and intrusion avoidance in
infrastructure networks. Implementing security in such dynamically changing networks is a hard task. Infrastructure network
characteristics should be taken into consideration to be clever to design efficient solutions. Here we spotlight on civilizing the flow
transmission privacy in infrastructure networks based on multipath routing. Certainly, we take benefit of the being of multiple paths
between nodes in an infrastructure network to increase the confidentiality robustness of transmitted data with the help of Access
Point. In our approach the original message to secure is split into shares through access point that are encrypted and combined then
transmitted along different disjointed existing paths between sender and receiver. Even if an intruderachieve something to get one or
more transmitted distribute the likelihood that the unique message will be reconstituted is very squat.
Keywords- Infrastructure networks Security Confidentiality Multipath routing Basic Service Set (BSS) and Extended
Service Set (ESS).
-----------------------------------------------------------------***----------------------------------------------------------------------------
1. INTRODUCTION
An 802.11networking framework in which devices
communicate with each other by first going through an
Access Point (AP). In infrastructure mode, wireless devices
can communicate with each other or can communicate with a
wired network. When one AP is connected to wired network
and a set of wireless stations it is referred to as a Basic
Service Set (BSS). An Extended Service Set (ESS) is a set of
two or more BSSs that form a single sub network. These base
stations provide access for mobile terminals to a backbone
wired network. Network control functions are performed by
the base stations, and often the base stations are connected
together to facilitate coordinated control. Base station
coordination in infrastructure-based networks provides a
centralized control mechanism for transmission scheduling,
dynamic resource allocation, power control, and
handoff.Handoff management has widely been recognized as
one of the most important and challenging problems for a
seamless access to wireless network.Most corporate wireless
LANs operate in infrastructure mode because they require
access to the wired LAN in order to use services such as file
servers or printers. compared to ad-hoc networks it
efficiently utilizes network resources and results in high data
rates and lower delays and loss. It also offers the advantage of
scalability, centralized security management and improved
reach. Flow transmission confidentiality is improved in
infrastructure through multipath routing. Multipath routing is
the routing technique of using multiple alternative paths
through a network, which can yield a variety of benefits such
as fault tolerance, increased bandwidth, or improved
security. The multiple paths computed might be overlapped,
edge-disjointed or node-disjointed with each other. Extensive
research has been done on multipath routing techniques, but
multipath routing is not yet widely deployed in practice.
Fig: 1Infrastructure Networks based on multipath Routing
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 972
Based on that Fig.1 to improve performance of data sharing in
the network and also refining the data security for transmitting
the data from one node to another node. Basic service set
operation provided signals through access point from one
infrastructure to other. In BSS, provide high data security by
support of access point in the wireless sensor networks for
multipath routing.
CMR (Concurrent Multipath Routing) is often taken to mean
simultaneous management and utilization of multiple available
paths for the transmission of streams of data emanating from
an application or multiple applications. In this form, each
stream is assigned a separate path, uniquely to the extent
supported by the number of paths available. If there are more
streams than available paths, some streams will share paths.
This provides better utilization of available bandwidth by
creating multiple active transmission queues. It also provides a
measure of fault tolerance in that, should a path fail, only the
traffic assigned to that path is affected, the other paths
continuing to serve their stream flows; there is also, ideally, an
alternative path immediately available upon which to continue
or restart the interrupted stream.
This method provides better transmission performance and
fault tolerance by providing:
 Simultaneous, parallel transport over multiple
carriers.
 Load balancing over available assets.
 Avoidance of path discovery when re-assigning an
interrupted stream.
2. SECURITY
Security in wireless networks generally ranges from errors and
omissions to threats to personal privacy.However, the more
immediate concerns for wireless communications are device
theft, denial of service, malicious hackers, malicious code,
theft of service,and industrial and foreign espionage.Attacks
resulting from these threats, if successful, place an agency’s
systems—and, more importantly, its data—at risk. Ensuring
confidentiality, integrity, authenticity, and availability are the
prime objectives of all government security policies and
practices. Information must be protected from unauthorized,
unanticipated, or unintentional modification. Security
requirements include the following:
Authenticity - A third party must be able to verify that the
content of a message has not been changed in transit.
Non-repudiation - The origin or the receipt of a specific
message must be verifiable by a third party.
Accountability - The actions of an entity must be traceable
uniquely to that entity.
3. RELATED WORK
Recently, several researches interesting in infrastructure
networks security aspects (like authentication, availability,
secure routing, intrusion detection, etc) do exist. We can
classify existing approaches into five principal categories:
 Trust Models
 Key Management Models
 Routing Protocols Security
 Intrusion Detection Systems
 Multipath protocols
We mention below, some important proposals concerning
each category:
3.1. Distributed Trust Model
The idea in[1] is based on the concept of trust. It adopts a
decentralized management approach, generalizes the notion of
rust, reduces ambiguity by using explicit trust statement and
makes easier the exchange of trust-related information via a
Recommendation Protocol. The Recommendation Protocol is
used to exchange trust information. Entities that are able to
execute the Recommendation Protocol are called agents.
Agents use trust categories to express trust towards other
agents and store reputation records in their private databases to
use them to generate recommendations to other agents. In this
solution, memory requirements for storing reputations and the
behavior of the Recommendation Protocol are issues that were
not treated.
3.2. Key Management Using Piconet
A Bluetooth network is called a small network orPiconet.It
has eight stations. One of which is called primary station and
the rest of the stations are called secondaries. All secondary
stations synchronize their clocks and hoping sequence with the
primary. A piconet can have only one primary station and the
communication between them is one-one or one-many.
Although a piconet can have a maximum of seven secondaries
an additional eight secondaries can be in parked state. A
secondary is synchronized with the primary but they cannot
take part in communication until it is moved from the parked
state. [3]
3.3.KeyAgreement Based Password
The work developed in [8] draws up the scenario of a group
wishing to provide a secured session in a conference room
without supporting any infrastructure. The approach describes
that these is a Weak Password that the entire group will share
(for example by writing it on a board). Then, each member
contributes to create a part of the session key using the weak
password. This secured session key makes it possible to
establish a secured channel without any centralized trust or
infrastructure. This solution is adapted, to the case of
conferences and meetings, where the number of nodes is
small. It is rather strong solution since it does not have a
strong shared key. But this model is not sufficient for more
complicated environments. If we consider a group of people
who do not know each other and want to communicate
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 973
confidentially, this model becomes invalid. Another problem
emerges if nodes are located in various places because the
distribution of the Weak Password will not be possible any
more.
3.4. Secure Multicast Communication In
Infrastructure Network
Multicast is the most suitable model for reducing the incurring
network load, when traffic needs to be securely delivered from
a single authorized sender to a large group of valid receivers.
Provision of security or multicast sessions is realized through
enciphering the session traffic with cryptographic keys. All
multicast members must hold valid keys in order to be able to
decrypt the received information.
The problem of distributing and updating the cryptographic
keys to valid members (key management), adds storage,
communication and computational overhead to the network
management. Key updates are required either periodically or
on-demand, to accommodate membership changes in multicast
groups. Security should consume as minimal energy as
possible in updating the keys. Authors in [7] present a cross-
layer algorithm that considers the node transmission power
(physical layer) and the multicastrouting tree (network layer)
in order to construct an energy efficient key distribution
scheme (application layer). That means they introduce a cross-
layer design approach for key management in wireless
multicast, that distributes cryptographic keys in an energy-
efficient way. This solution is targeted towards a very special
case (key management for multicast in infrastructure networks
ensuring energy efficiency) and is complicated and supposes
that the power consumption of computations is significantly
reduceddue to advances in silicon technologies, which is not
true for all infrastructure network devices.
3.5. Secure Routing Protocol For Mobile
Infrastructure Networks
An important aspect of infrastructure network security is
routing security. The Secure Routing Protocol (SRP)
presented in [9,6,12,10] counters malicious behavior that
targets the discovery of topological information. SRP provides
correct routing information (factual, up-to-date, and authentic
connectivity information regarding a pair of nodes that wish to
communicate in a secure manner). SRP discovers one or more
routes whose correctness can be verified. After verification,
route request are propagated tothe desired trusted destination.
Route replies are returned strictly over the reversed route, as
accumulated in the route request packet. There is an
interaction of the protocol with the IP layer functionality. The
reported path is the one placed in the reply packet by the
destination, and the corresponding connectivityinformation is
correct, since the reply was relayed along the reverse of the
discovered route. They ensure that attackers cannot
impersonate the destination and redirect data traffic, cannot
respond with stale or corrupted routing information, are
prevented from broadcasting forged control packets to prevent
the laterpropagation of legitimate queries, and are unable to
influence the topological knowledge of benign nodes.
3.6. Intrusion Detection
One of recent interesting aspects of security in wireless
networks, especially infrastructure networks is intrusion
detection. It concerns detecting inappropriate, incorrect, or
anomalous activity in the network. In [11] authors examine the
vulnerabilities of wireless networks and argue that intrusion
detection is avery important element in the security
architecture for mobile computing environment. They
developed such an architecture and evaluated a key
mechanism in this architecture, anomaly detection for mobile
infrastructure network through simulation experiments.
Intrusion prevention measures, such as encryption and
authentication, can be used in infrastructure networks to
reduce intrusion, but cannot eliminate them. For example,
encryption and authentication cannot defend against
compromised mobile nodes, whichoften carry the private keys.
In their architecture [11], they suggest that intrusion detection
and response systems should be both distributed and
cooperative to suit the needs of mobile infrastructure
networks. Also, every node participates in intrusion detection
and response. Thus there are individual IDS (Intrusion
Detection Systems) agents placed on each node. If anomaly is
detected in the local data, neighboring IDS agents will
cooperatively participate in global intrusion detection actions.
They conclude that intrusion detection can compliment
intrusion prevention techniques (such encryption,
authentication, secure MAC, secure routing, etc.) to secure
mobile computing environment.
3.7. Security Based Multipath Routing Protocols
The aspect in which we are interested is this last one: security
based multipath routing protocols. Multipath routing allows
the establishment of multiple paths between a single source
and single destination node. It is typically proposed in order to
increase the reliability of data transmission (i.e., fault
tolerance) or to provide load balancing [8]. Multipath routing
has been explored in several different contexts. Traditional
circuit switched telephone networks used a type of multipath
routing called alternate path routing. Multipath routing has
also been addressed in data networks which are intended to
support connection oriented service with QoS like in ATM.
We can take advantage of multipath routing to improve
infrastructure network security. Let us assume that we have a
secret message, if we send it through a single path, the enemy
can compromise it by compromising any one of the nodes
along this path. However, if we divide it into multiple parts
and send these multiple parts via multiple independent paths,
then the enemy has to compromise all the pieces from all the
paths to compromise the message. Since 2003, some
approaches were developed in this direction. Up until now
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 974
there are only four protocols dealing with the infrastructure
security problem using multipath routing (including our
approach): SDMP, SPREAD [11].
3.8 Spread
The Security Protocol for Reliable Data Delivery (SPREAD)
scheme addresses data confidentiality and data availability in a
hostile infrastructure environment. The confidentiality and
availability of message exchanges is enhanced through
multipath routing with the help of SPREAD scheme
assumptions like link encryption with neighboring nodes. The
SPREAD scheme proposes the use of a(T,N) threshold secret
sharing algorithm [5] to divide messages into multiple pieces.
The simulation results of SPREAD show that the message
interception probability, for both passive and active attacks,
rapidly decreases with an increase in the number of paths used
to transmit the message thereby enhancing data confidentiality
Fig:2.
Fig:2 Spreading the frame different path
4. SECURING DATA BASED MULTIPATH
ROUTING IN INFRASTRUCTURE NETWORKS
(SDMP)
The idea behind our protocol is to divide the initial message
into parts then to encrypt and combine these parts by pairs.
Then we exploit the characteristic of existence of multiple
paths between nodes in an infrastructure networks to increase
the robustness of confidentiality. This is achieved by sending
encrypted combinations on the different existing paths
between the sender and the receiver. In our solution, even if an
attacker succeeds to have one part or more of transmitted
parts, the probability that the original message can be
reconstructed is low. We start by presenting our method
principle.
4.1. Principle
At first, we present the principle of SDMP protocol in a
simplified scheme, and then we explain in detail how it works.
The originality of our approach is that it does not modify the
existing lower layer protocols. Some assumptions should be
taken into consideration:
 The sender `A' and the receiver `B' are authenticated,
 WEP or TKIP is used for the encryption/decryption
of frames at MAC layer and the authentication of the
terminals,
 A mechanism of discovering the topology of the
network is available,
 The protocol uses a routing protocol supporting
multipath routing.
4.2 .Paths Selection InSDMP
In an infrastructure network to the topology for changes
frequently depends on the transmission mode (BSS or ESS)
from the wireless LAN or Wireless sensor networks, which
makes wireless links instable. Sometimes packets might be
dropped due to the bad wireless channel conditions, the
collision at MAC layer transmission, or because of out of date
routing information. When packet loss does occur, non-
redundant share allocation will disable the reconstruction of
the message at the intended destination. To deal with this
problem, it is necessary to introduce some redundancy (if
there is enough paths) in SDMP protocol to improve the
reliability, (i.e. the destination would have better chance to
receive enough shares for reconstructing the initial message).
We propose that the decision of using or not redundancy will
be taken according to the average mobility of the network's
nodes and to the existing path number.
Fig:3Infrastructure network with BSSFig:4 Infrastructure
network with ESS
SDMP is based on multipath routing in infrastructure
networks. The question is how to find the desired multiple
paths in infrastructure network and how to deliver the different
message parts to the destination using these paths? Routing in
a infrastructure network presents great challenge because the
nodes are capable of moving and the network topology(Fig.3
and Fig.4) can change continuously and unpredictably. The
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 975
Dynamic Source Routing (DSR) protocol is capable of
maintaining multiple paths from the source to a destination.
This on-demand protocol works by broadcasting the route
inquiry messages throughout the network and then gathering
the replies from the destination.
CONCLUSIONS
In this paper, we proposed a new solution that treats data
confidentiality problem by exploiting a very important
Infrastructure Network feature, which is used the existence of
multiple paths between nodes. Our proposal improves data
security efficiently without being time-consuming. It takes
profit from existing Infrastructure Network characteristics and
does not modify existing lower layer protocols. It is not
complicated and can be implemented in different
infrastructure network. This protocol is strongly based on
multipath routing characteristics of infrastructure networks
and uses a route selection based on security costs and
BSS,ESS provide the high data security for secure data
transmission via access point (AP). In this continuation our
process before sending the data to check the path is idle or
busy, afterword's, to send the data. The more the number of
used paths is important, the more confidentiality is enforced.
SDMP protocol can be combined with other solutions which
consider other security aspects than confidentiality to improve
significantly the efficiency of security systems in
infrastructure network.
REFERENCES
[1]. Abdul-Rahman, S. Hailes, A Distributed Trust Model,
in: Proc 97 New securityparadigms, Langdale,
Cumbria, United Kingdom, Sep 23_26 1997, pp. 48_60.
[2]. Shamir, How to share a secret, Communications of the
ACM 22 (11) (1979) 612_613.
[3]. Behrouz A. Forouzan, Data communications and
Networking, Fourth Edition,McGraw Hill Forouzan
Networking series (2007).
[4]. J. Marshall, An analysis of SRP for mobile ad hoc
networks, in: Proc of The 2002International Multi-
Conference in Computer Science, Las Vegas, USA,
2002.
[5]. Jalel Ben Othman, Lynda Mokdad, Enhancing data
security in ad hoc networks based on multipath routing,
J. Parallel Distrib. Comput. 70 (2010) 309_316.
[6]. Jing Liu, Fei Fu, Junmo Xiao, Yang Lu, Secure routing
ad hoc networks, in: SoftwareEngineering, Artificial
Intelligence, Networking and Parallel/distributed
Computing, 2007.
[7]. L. Loukas, R. Poovendran, Cross-layer design for
energy-efficient secure multicast communications in ad
hoc networks, in: Proc of IEEE ICC 2004, Paris,
France, May 2004.
[8]. N. Asokan, P. Ginzboorg, Key Agreement in ad hoc
Networks, Computer Communications 23 (17) (2000)
1627_1637.
[9]. P. Papadimitratos, Z.J. Haas, Secure routing for mobile
ad hoc networks, in: SCS Comm. Networks and
Distributed Systems Modeling and Simulation, CNDS
2002, San Antonio, TX, Jan. 27_31, 2002.
[10]. Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig,
Jesse Walker, Wade Trappe,SEAR: A secure efficient
ad hoc on demand routing protocol for wireless
networks, in: ACM Symposium on Information,
Computer and Communication Security, ASIACCS
2008.
[11]. Y. Zhang, W. Lee, Y. Huang, Intrusion detection
techniques for mobile wireless networks, ACM
MONET Journal (2002).
[12]. Yih-Chun Hu, A. Perring, A survey of secure wireless
ad hoc routing, IEEE Security and Privacy 2 (3) (2004).

More Related Content

What's hot

Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksAuthentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksEditor IJCATR
 
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...IJERA Editor
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notesJayanth Dwijesh H P
 
G041124047
G041124047G041124047
G041124047IOSR-JEN
 
Review on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewallReview on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewalleSAT Publishing House
 
710201940
710201940710201940
710201940IJRAT
 
A Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSA Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSCSCJournals
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iinventionjournals
 
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...IJCNCJournal
 
A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...IJECEIAES
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
 
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
JPJ1435   Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...JPJ1435   Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...chennaijp
 
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...IEEEMEMTECHSTUDENTPROJECTS
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
 
Secure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksIGEEKS TECHNOLOGIES
 

What's hot (20)

Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant NetworksAuthentic Data Access Scheme for Variant Disruption- Tolerant Networks
Authentic Data Access Scheme for Variant Disruption- Tolerant Networks
 
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notes
 
G041124047
G041124047G041124047
G041124047
 
Review on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewallReview on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewall
 
A44080104
A44080104A44080104
A44080104
 
710201940
710201940710201940
710201940
 
A Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSA Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETS
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
 
A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
 
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
JPJ1435   Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...JPJ1435   Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
 
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
 
Secure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networks
 

Viewers also liked

Experimental investigations of vegetable & mineral oil performance during...
Experimental investigations of vegetable & mineral oil performance during...Experimental investigations of vegetable & mineral oil performance during...
Experimental investigations of vegetable & mineral oil performance during...eSAT Journals
 
A survey on nuclear to-cytoplasmic ratio analysis using image segmentation
A survey on nuclear to-cytoplasmic ratio analysis using image segmentationA survey on nuclear to-cytoplasmic ratio analysis using image segmentation
A survey on nuclear to-cytoplasmic ratio analysis using image segmentationeSAT Journals
 
Artificial intelligence based control approach for membrane bioreactor in sew...
Artificial intelligence based control approach for membrane bioreactor in sew...Artificial intelligence based control approach for membrane bioreactor in sew...
Artificial intelligence based control approach for membrane bioreactor in sew...eSAT Journals
 
Sequences classification based on group technology for flexible manufacturing...
Sequences classification based on group technology for flexible manufacturing...Sequences classification based on group technology for flexible manufacturing...
Sequences classification based on group technology for flexible manufacturing...eSAT Journals
 
Selection of intra prediction modes for intra frame coding in advanced video ...
Selection of intra prediction modes for intra frame coding in advanced video ...Selection of intra prediction modes for intra frame coding in advanced video ...
Selection of intra prediction modes for intra frame coding in advanced video ...eSAT Journals
 
Singularity condition of wrist partitioned 6-r serial manipulator based on gr...
Singularity condition of wrist partitioned 6-r serial manipulator based on gr...Singularity condition of wrist partitioned 6-r serial manipulator based on gr...
Singularity condition of wrist partitioned 6-r serial manipulator based on gr...eSAT Journals
 
Statistical analysis of various sub systems of panel production system in und...
Statistical analysis of various sub systems of panel production system in und...Statistical analysis of various sub systems of panel production system in und...
Statistical analysis of various sub systems of panel production system in und...eSAT Journals
 
Understanding qualitative conceptions of livability
Understanding qualitative conceptions of livabilityUnderstanding qualitative conceptions of livability
Understanding qualitative conceptions of livabilityeSAT Journals
 
A brief review of segmentation methods for medical images
A brief review of segmentation methods for medical imagesA brief review of segmentation methods for medical images
A brief review of segmentation methods for medical imageseSAT Journals
 
Subject distribution using data mining
Subject distribution using data miningSubject distribution using data mining
Subject distribution using data miningeSAT Journals
 
Indian spices and its antifungal activity
Indian spices and its antifungal activityIndian spices and its antifungal activity
Indian spices and its antifungal activityeSAT Journals
 
Run time dynamic partial reconfiguration using microblaze soft core processor...
Run time dynamic partial reconfiguration using microblaze soft core processor...Run time dynamic partial reconfiguration using microblaze soft core processor...
Run time dynamic partial reconfiguration using microblaze soft core processor...eSAT Journals
 
Determination of the equivalent elastic coefficients of the composite materia...
Determination of the equivalent elastic coefficients of the composite materia...Determination of the equivalent elastic coefficients of the composite materia...
Determination of the equivalent elastic coefficients of the composite materia...eSAT Journals
 
An experiental investigation of effect of cutting parameters and tool materia...
An experiental investigation of effect of cutting parameters and tool materia...An experiental investigation of effect of cutting parameters and tool materia...
An experiental investigation of effect of cutting parameters and tool materia...eSAT Journals
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architectureeSAT Journals
 
The effect of fiber orientation and laminate stacking sequences on the torsio...
The effect of fiber orientation and laminate stacking sequences on the torsio...The effect of fiber orientation and laminate stacking sequences on the torsio...
The effect of fiber orientation and laminate stacking sequences on the torsio...eSAT Journals
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Physical and mechanical properties of concrete containing fibers from industr...
Physical and mechanical properties of concrete containing fibers from industr...Physical and mechanical properties of concrete containing fibers from industr...
Physical and mechanical properties of concrete containing fibers from industr...eSAT Journals
 

Viewers also liked (18)

Experimental investigations of vegetable & mineral oil performance during...
Experimental investigations of vegetable & mineral oil performance during...Experimental investigations of vegetable & mineral oil performance during...
Experimental investigations of vegetable & mineral oil performance during...
 
A survey on nuclear to-cytoplasmic ratio analysis using image segmentation
A survey on nuclear to-cytoplasmic ratio analysis using image segmentationA survey on nuclear to-cytoplasmic ratio analysis using image segmentation
A survey on nuclear to-cytoplasmic ratio analysis using image segmentation
 
Artificial intelligence based control approach for membrane bioreactor in sew...
Artificial intelligence based control approach for membrane bioreactor in sew...Artificial intelligence based control approach for membrane bioreactor in sew...
Artificial intelligence based control approach for membrane bioreactor in sew...
 
Sequences classification based on group technology for flexible manufacturing...
Sequences classification based on group technology for flexible manufacturing...Sequences classification based on group technology for flexible manufacturing...
Sequences classification based on group technology for flexible manufacturing...
 
Selection of intra prediction modes for intra frame coding in advanced video ...
Selection of intra prediction modes for intra frame coding in advanced video ...Selection of intra prediction modes for intra frame coding in advanced video ...
Selection of intra prediction modes for intra frame coding in advanced video ...
 
Singularity condition of wrist partitioned 6-r serial manipulator based on gr...
Singularity condition of wrist partitioned 6-r serial manipulator based on gr...Singularity condition of wrist partitioned 6-r serial manipulator based on gr...
Singularity condition of wrist partitioned 6-r serial manipulator based on gr...
 
Statistical analysis of various sub systems of panel production system in und...
Statistical analysis of various sub systems of panel production system in und...Statistical analysis of various sub systems of panel production system in und...
Statistical analysis of various sub systems of panel production system in und...
 
Understanding qualitative conceptions of livability
Understanding qualitative conceptions of livabilityUnderstanding qualitative conceptions of livability
Understanding qualitative conceptions of livability
 
A brief review of segmentation methods for medical images
A brief review of segmentation methods for medical imagesA brief review of segmentation methods for medical images
A brief review of segmentation methods for medical images
 
Subject distribution using data mining
Subject distribution using data miningSubject distribution using data mining
Subject distribution using data mining
 
Indian spices and its antifungal activity
Indian spices and its antifungal activityIndian spices and its antifungal activity
Indian spices and its antifungal activity
 
Run time dynamic partial reconfiguration using microblaze soft core processor...
Run time dynamic partial reconfiguration using microblaze soft core processor...Run time dynamic partial reconfiguration using microblaze soft core processor...
Run time dynamic partial reconfiguration using microblaze soft core processor...
 
Determination of the equivalent elastic coefficients of the composite materia...
Determination of the equivalent elastic coefficients of the composite materia...Determination of the equivalent elastic coefficients of the composite materia...
Determination of the equivalent elastic coefficients of the composite materia...
 
An experiental investigation of effect of cutting parameters and tool materia...
An experiental investigation of effect of cutting parameters and tool materia...An experiental investigation of effect of cutting parameters and tool materia...
An experiental investigation of effect of cutting parameters and tool materia...
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architecture
 
The effect of fiber orientation and laminate stacking sequences on the torsio...
The effect of fiber orientation and laminate stacking sequences on the torsio...The effect of fiber orientation and laminate stacking sequences on the torsio...
The effect of fiber orientation and laminate stacking sequences on the torsio...
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Physical and mechanical properties of concrete containing fibers from industr...
Physical and mechanical properties of concrete containing fibers from industr...Physical and mechanical properties of concrete containing fibers from industr...
Physical and mechanical properties of concrete containing fibers from industr...
 

Similar to Refining data security in infrastructurenetworks support of multipath routing

Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2eSAT Journals
 
Securing voip communications in an open network
Securing voip communications in an open networkSecuring voip communications in an open network
Securing voip communications in an open networkeSAT Publishing House
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...eSAT Journals
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...IOSR Journals
 
An efficient approach for secured communication in wireless sensor networks
 An efficient approach for secured communication in wireless sensor networks  An efficient approach for secured communication in wireless sensor networks
An efficient approach for secured communication in wireless sensor networks IJECEIAES
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
 
Securing information in wireless sensor networks
Securing information in wireless sensor networksSecuring information in wireless sensor networks
Securing information in wireless sensor networkseSAT Publishing House
 
Securing cluster based adhoc network through balanced clustering with distrib...
Securing cluster based adhoc network through balanced clustering with distrib...Securing cluster based adhoc network through balanced clustering with distrib...
Securing cluster based adhoc network through balanced clustering with distrib...eSAT Journals
 
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkProbabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkIRJET Journal
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc NetworksRouting and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
 
A Review Security Issues In Mobile Ad Hoc Network
A Review  Security Issues In Mobile Ad Hoc NetworkA Review  Security Issues In Mobile Ad Hoc Network
A Review Security Issues In Mobile Ad Hoc NetworkCourtney Esco
 

Similar to Refining data security in infrastructurenetworks support of multipath routing (20)

Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2
 
Securing voip communications in an open network
Securing voip communications in an open networkSecuring voip communications in an open network
Securing voip communications in an open network
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
 
An efficient approach for secured communication in wireless sensor networks
 An efficient approach for secured communication in wireless sensor networks  An efficient approach for secured communication in wireless sensor networks
An efficient approach for secured communication in wireless sensor networks
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
Securing information in wireless sensor networks
Securing information in wireless sensor networksSecuring information in wireless sensor networks
Securing information in wireless sensor networks
 
Securing cluster based adhoc network through balanced clustering with distrib...
Securing cluster based adhoc network through balanced clustering with distrib...Securing cluster based adhoc network through balanced clustering with distrib...
Securing cluster based adhoc network through balanced clustering with distrib...
 
L010527175
L010527175L010527175
L010527175
 
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkProbabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
 
A Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor NetworkA Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor Network
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc NetworksRouting and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
 
A017320105
A017320105A017320105
A017320105
 
A Review Security Issues In Mobile Ad Hoc Network
A Review  Security Issues In Mobile Ad Hoc NetworkA Review  Security Issues In Mobile Ad Hoc Network
A Review Security Issues In Mobile Ad Hoc Network
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 

Recently uploaded (20)

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 

Refining data security in infrastructurenetworks support of multipath routing

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 971 REFINING DATA SECURITY IN INFRASTRUCTURENETWORKS SUPPORT OF MULTIPATH ROUTING K. Karnavel1 , L. shalini2 , M. Ramananthini3 1 Assistant Professor, 2,3 PG Student, Department of Computer Science & Engineering, AIHT, Chennai treseofkarnavel@gmail.com Abstract An infrastructure network is a self-organizing network with help of Access Point (AP) of wireless links connecting nodes to another. The nodes can communicate without an ad hoc. They form an uninformed topology(BSS/ESS), where the nodes play the role of routers and are free to move randomly. Infrastructure networks proved their efficiency being used in different fields but they are highly vulnerable to security attacks and dealing with this is one of the main challenges of these networks at present.In recent times some clarification are proposed to provide authentication, confidentiality, availability, secure routing and intrusion avoidance in infrastructure networks. Implementing security in such dynamically changing networks is a hard task. Infrastructure network characteristics should be taken into consideration to be clever to design efficient solutions. Here we spotlight on civilizing the flow transmission privacy in infrastructure networks based on multipath routing. Certainly, we take benefit of the being of multiple paths between nodes in an infrastructure network to increase the confidentiality robustness of transmitted data with the help of Access Point. In our approach the original message to secure is split into shares through access point that are encrypted and combined then transmitted along different disjointed existing paths between sender and receiver. Even if an intruderachieve something to get one or more transmitted distribute the likelihood that the unique message will be reconstituted is very squat. Keywords- Infrastructure networks Security Confidentiality Multipath routing Basic Service Set (BSS) and Extended Service Set (ESS). -----------------------------------------------------------------***---------------------------------------------------------------------------- 1. INTRODUCTION An 802.11networking framework in which devices communicate with each other by first going through an Access Point (AP). In infrastructure mode, wireless devices can communicate with each other or can communicate with a wired network. When one AP is connected to wired network and a set of wireless stations it is referred to as a Basic Service Set (BSS). An Extended Service Set (ESS) is a set of two or more BSSs that form a single sub network. These base stations provide access for mobile terminals to a backbone wired network. Network control functions are performed by the base stations, and often the base stations are connected together to facilitate coordinated control. Base station coordination in infrastructure-based networks provides a centralized control mechanism for transmission scheduling, dynamic resource allocation, power control, and handoff.Handoff management has widely been recognized as one of the most important and challenging problems for a seamless access to wireless network.Most corporate wireless LANs operate in infrastructure mode because they require access to the wired LAN in order to use services such as file servers or printers. compared to ad-hoc networks it efficiently utilizes network resources and results in high data rates and lower delays and loss. It also offers the advantage of scalability, centralized security management and improved reach. Flow transmission confidentiality is improved in infrastructure through multipath routing. Multipath routing is the routing technique of using multiple alternative paths through a network, which can yield a variety of benefits such as fault tolerance, increased bandwidth, or improved security. The multiple paths computed might be overlapped, edge-disjointed or node-disjointed with each other. Extensive research has been done on multipath routing techniques, but multipath routing is not yet widely deployed in practice. Fig: 1Infrastructure Networks based on multipath Routing
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 972 Based on that Fig.1 to improve performance of data sharing in the network and also refining the data security for transmitting the data from one node to another node. Basic service set operation provided signals through access point from one infrastructure to other. In BSS, provide high data security by support of access point in the wireless sensor networks for multipath routing. CMR (Concurrent Multipath Routing) is often taken to mean simultaneous management and utilization of multiple available paths for the transmission of streams of data emanating from an application or multiple applications. In this form, each stream is assigned a separate path, uniquely to the extent supported by the number of paths available. If there are more streams than available paths, some streams will share paths. This provides better utilization of available bandwidth by creating multiple active transmission queues. It also provides a measure of fault tolerance in that, should a path fail, only the traffic assigned to that path is affected, the other paths continuing to serve their stream flows; there is also, ideally, an alternative path immediately available upon which to continue or restart the interrupted stream. This method provides better transmission performance and fault tolerance by providing:  Simultaneous, parallel transport over multiple carriers.  Load balancing over available assets.  Avoidance of path discovery when re-assigning an interrupted stream. 2. SECURITY Security in wireless networks generally ranges from errors and omissions to threats to personal privacy.However, the more immediate concerns for wireless communications are device theft, denial of service, malicious hackers, malicious code, theft of service,and industrial and foreign espionage.Attacks resulting from these threats, if successful, place an agency’s systems—and, more importantly, its data—at risk. Ensuring confidentiality, integrity, authenticity, and availability are the prime objectives of all government security policies and practices. Information must be protected from unauthorized, unanticipated, or unintentional modification. Security requirements include the following: Authenticity - A third party must be able to verify that the content of a message has not been changed in transit. Non-repudiation - The origin or the receipt of a specific message must be verifiable by a third party. Accountability - The actions of an entity must be traceable uniquely to that entity. 3. RELATED WORK Recently, several researches interesting in infrastructure networks security aspects (like authentication, availability, secure routing, intrusion detection, etc) do exist. We can classify existing approaches into five principal categories:  Trust Models  Key Management Models  Routing Protocols Security  Intrusion Detection Systems  Multipath protocols We mention below, some important proposals concerning each category: 3.1. Distributed Trust Model The idea in[1] is based on the concept of trust. It adopts a decentralized management approach, generalizes the notion of rust, reduces ambiguity by using explicit trust statement and makes easier the exchange of trust-related information via a Recommendation Protocol. The Recommendation Protocol is used to exchange trust information. Entities that are able to execute the Recommendation Protocol are called agents. Agents use trust categories to express trust towards other agents and store reputation records in their private databases to use them to generate recommendations to other agents. In this solution, memory requirements for storing reputations and the behavior of the Recommendation Protocol are issues that were not treated. 3.2. Key Management Using Piconet A Bluetooth network is called a small network orPiconet.It has eight stations. One of which is called primary station and the rest of the stations are called secondaries. All secondary stations synchronize their clocks and hoping sequence with the primary. A piconet can have only one primary station and the communication between them is one-one or one-many. Although a piconet can have a maximum of seven secondaries an additional eight secondaries can be in parked state. A secondary is synchronized with the primary but they cannot take part in communication until it is moved from the parked state. [3] 3.3.KeyAgreement Based Password The work developed in [8] draws up the scenario of a group wishing to provide a secured session in a conference room without supporting any infrastructure. The approach describes that these is a Weak Password that the entire group will share (for example by writing it on a board). Then, each member contributes to create a part of the session key using the weak password. This secured session key makes it possible to establish a secured channel without any centralized trust or infrastructure. This solution is adapted, to the case of conferences and meetings, where the number of nodes is small. It is rather strong solution since it does not have a strong shared key. But this model is not sufficient for more complicated environments. If we consider a group of people who do not know each other and want to communicate
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 973 confidentially, this model becomes invalid. Another problem emerges if nodes are located in various places because the distribution of the Weak Password will not be possible any more. 3.4. Secure Multicast Communication In Infrastructure Network Multicast is the most suitable model for reducing the incurring network load, when traffic needs to be securely delivered from a single authorized sender to a large group of valid receivers. Provision of security or multicast sessions is realized through enciphering the session traffic with cryptographic keys. All multicast members must hold valid keys in order to be able to decrypt the received information. The problem of distributing and updating the cryptographic keys to valid members (key management), adds storage, communication and computational overhead to the network management. Key updates are required either periodically or on-demand, to accommodate membership changes in multicast groups. Security should consume as minimal energy as possible in updating the keys. Authors in [7] present a cross- layer algorithm that considers the node transmission power (physical layer) and the multicastrouting tree (network layer) in order to construct an energy efficient key distribution scheme (application layer). That means they introduce a cross- layer design approach for key management in wireless multicast, that distributes cryptographic keys in an energy- efficient way. This solution is targeted towards a very special case (key management for multicast in infrastructure networks ensuring energy efficiency) and is complicated and supposes that the power consumption of computations is significantly reduceddue to advances in silicon technologies, which is not true for all infrastructure network devices. 3.5. Secure Routing Protocol For Mobile Infrastructure Networks An important aspect of infrastructure network security is routing security. The Secure Routing Protocol (SRP) presented in [9,6,12,10] counters malicious behavior that targets the discovery of topological information. SRP provides correct routing information (factual, up-to-date, and authentic connectivity information regarding a pair of nodes that wish to communicate in a secure manner). SRP discovers one or more routes whose correctness can be verified. After verification, route request are propagated tothe desired trusted destination. Route replies are returned strictly over the reversed route, as accumulated in the route request packet. There is an interaction of the protocol with the IP layer functionality. The reported path is the one placed in the reply packet by the destination, and the corresponding connectivityinformation is correct, since the reply was relayed along the reverse of the discovered route. They ensure that attackers cannot impersonate the destination and redirect data traffic, cannot respond with stale or corrupted routing information, are prevented from broadcasting forged control packets to prevent the laterpropagation of legitimate queries, and are unable to influence the topological knowledge of benign nodes. 3.6. Intrusion Detection One of recent interesting aspects of security in wireless networks, especially infrastructure networks is intrusion detection. It concerns detecting inappropriate, incorrect, or anomalous activity in the network. In [11] authors examine the vulnerabilities of wireless networks and argue that intrusion detection is avery important element in the security architecture for mobile computing environment. They developed such an architecture and evaluated a key mechanism in this architecture, anomaly detection for mobile infrastructure network through simulation experiments. Intrusion prevention measures, such as encryption and authentication, can be used in infrastructure networks to reduce intrusion, but cannot eliminate them. For example, encryption and authentication cannot defend against compromised mobile nodes, whichoften carry the private keys. In their architecture [11], they suggest that intrusion detection and response systems should be both distributed and cooperative to suit the needs of mobile infrastructure networks. Also, every node participates in intrusion detection and response. Thus there are individual IDS (Intrusion Detection Systems) agents placed on each node. If anomaly is detected in the local data, neighboring IDS agents will cooperatively participate in global intrusion detection actions. They conclude that intrusion detection can compliment intrusion prevention techniques (such encryption, authentication, secure MAC, secure routing, etc.) to secure mobile computing environment. 3.7. Security Based Multipath Routing Protocols The aspect in which we are interested is this last one: security based multipath routing protocols. Multipath routing allows the establishment of multiple paths between a single source and single destination node. It is typically proposed in order to increase the reliability of data transmission (i.e., fault tolerance) or to provide load balancing [8]. Multipath routing has been explored in several different contexts. Traditional circuit switched telephone networks used a type of multipath routing called alternate path routing. Multipath routing has also been addressed in data networks which are intended to support connection oriented service with QoS like in ATM. We can take advantage of multipath routing to improve infrastructure network security. Let us assume that we have a secret message, if we send it through a single path, the enemy can compromise it by compromising any one of the nodes along this path. However, if we divide it into multiple parts and send these multiple parts via multiple independent paths, then the enemy has to compromise all the pieces from all the paths to compromise the message. Since 2003, some approaches were developed in this direction. Up until now
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 974 there are only four protocols dealing with the infrastructure security problem using multipath routing (including our approach): SDMP, SPREAD [11]. 3.8 Spread The Security Protocol for Reliable Data Delivery (SPREAD) scheme addresses data confidentiality and data availability in a hostile infrastructure environment. The confidentiality and availability of message exchanges is enhanced through multipath routing with the help of SPREAD scheme assumptions like link encryption with neighboring nodes. The SPREAD scheme proposes the use of a(T,N) threshold secret sharing algorithm [5] to divide messages into multiple pieces. The simulation results of SPREAD show that the message interception probability, for both passive and active attacks, rapidly decreases with an increase in the number of paths used to transmit the message thereby enhancing data confidentiality Fig:2. Fig:2 Spreading the frame different path 4. SECURING DATA BASED MULTIPATH ROUTING IN INFRASTRUCTURE NETWORKS (SDMP) The idea behind our protocol is to divide the initial message into parts then to encrypt and combine these parts by pairs. Then we exploit the characteristic of existence of multiple paths between nodes in an infrastructure networks to increase the robustness of confidentiality. This is achieved by sending encrypted combinations on the different existing paths between the sender and the receiver. In our solution, even if an attacker succeeds to have one part or more of transmitted parts, the probability that the original message can be reconstructed is low. We start by presenting our method principle. 4.1. Principle At first, we present the principle of SDMP protocol in a simplified scheme, and then we explain in detail how it works. The originality of our approach is that it does not modify the existing lower layer protocols. Some assumptions should be taken into consideration:  The sender `A' and the receiver `B' are authenticated,  WEP or TKIP is used for the encryption/decryption of frames at MAC layer and the authentication of the terminals,  A mechanism of discovering the topology of the network is available,  The protocol uses a routing protocol supporting multipath routing. 4.2 .Paths Selection InSDMP In an infrastructure network to the topology for changes frequently depends on the transmission mode (BSS or ESS) from the wireless LAN or Wireless sensor networks, which makes wireless links instable. Sometimes packets might be dropped due to the bad wireless channel conditions, the collision at MAC layer transmission, or because of out of date routing information. When packet loss does occur, non- redundant share allocation will disable the reconstruction of the message at the intended destination. To deal with this problem, it is necessary to introduce some redundancy (if there is enough paths) in SDMP protocol to improve the reliability, (i.e. the destination would have better chance to receive enough shares for reconstructing the initial message). We propose that the decision of using or not redundancy will be taken according to the average mobility of the network's nodes and to the existing path number. Fig:3Infrastructure network with BSSFig:4 Infrastructure network with ESS SDMP is based on multipath routing in infrastructure networks. The question is how to find the desired multiple paths in infrastructure network and how to deliver the different message parts to the destination using these paths? Routing in a infrastructure network presents great challenge because the nodes are capable of moving and the network topology(Fig.3 and Fig.4) can change continuously and unpredictably. The
  • 5. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 975 Dynamic Source Routing (DSR) protocol is capable of maintaining multiple paths from the source to a destination. This on-demand protocol works by broadcasting the route inquiry messages throughout the network and then gathering the replies from the destination. CONCLUSIONS In this paper, we proposed a new solution that treats data confidentiality problem by exploiting a very important Infrastructure Network feature, which is used the existence of multiple paths between nodes. Our proposal improves data security efficiently without being time-consuming. It takes profit from existing Infrastructure Network characteristics and does not modify existing lower layer protocols. It is not complicated and can be implemented in different infrastructure network. This protocol is strongly based on multipath routing characteristics of infrastructure networks and uses a route selection based on security costs and BSS,ESS provide the high data security for secure data transmission via access point (AP). In this continuation our process before sending the data to check the path is idle or busy, afterword's, to send the data. The more the number of used paths is important, the more confidentiality is enforced. SDMP protocol can be combined with other solutions which consider other security aspects than confidentiality to improve significantly the efficiency of security systems in infrastructure network. REFERENCES [1]. Abdul-Rahman, S. Hailes, A Distributed Trust Model, in: Proc 97 New securityparadigms, Langdale, Cumbria, United Kingdom, Sep 23_26 1997, pp. 48_60. [2]. Shamir, How to share a secret, Communications of the ACM 22 (11) (1979) 612_613. [3]. Behrouz A. Forouzan, Data communications and Networking, Fourth Edition,McGraw Hill Forouzan Networking series (2007). [4]. J. Marshall, An analysis of SRP for mobile ad hoc networks, in: Proc of The 2002International Multi- Conference in Computer Science, Las Vegas, USA, 2002. [5]. Jalel Ben Othman, Lynda Mokdad, Enhancing data security in ad hoc networks based on multipath routing, J. Parallel Distrib. Comput. 70 (2010) 309_316. [6]. Jing Liu, Fei Fu, Junmo Xiao, Yang Lu, Secure routing ad hoc networks, in: SoftwareEngineering, Artificial Intelligence, Networking and Parallel/distributed Computing, 2007. [7]. L. Loukas, R. Poovendran, Cross-layer design for energy-efficient secure multicast communications in ad hoc networks, in: Proc of IEEE ICC 2004, Paris, France, May 2004. [8]. N. Asokan, P. Ginzboorg, Key Agreement in ad hoc Networks, Computer Communications 23 (17) (2000) 1627_1637. [9]. P. Papadimitratos, Z.J. Haas, Secure routing for mobile ad hoc networks, in: SCS Comm. Networks and Distributed Systems Modeling and Simulation, CNDS 2002, San Antonio, TX, Jan. 27_31, 2002. [10]. Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe,SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks, in: ACM Symposium on Information, Computer and Communication Security, ASIACCS 2008. [11]. Y. Zhang, W. Lee, Y. Huang, Intrusion detection techniques for mobile wireless networks, ACM MONET Journal (2002). [12]. Yih-Chun Hu, A. Perring, A survey of secure wireless ad hoc routing, IEEE Security and Privacy 2 (3) (2004).