SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks

Size: px
Start display at page:

Download "SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks"

Transcription

1 IEEE ICC 23 - Wireless Networking Symposium SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada, N2L 3G {k2zhang, x27liang, rxlu, xshen}@bbcr.uwaterloo.ca Abstract Mobile Social Networks (MSN), as an emerging social networking platform, facilitates social interaction and information sharing among users in the proximity. Spam filtering protocols are extremely important to reduce communication and storage overhead when many spam packets without specific destinations are diffused in MSNs. In this paper, we propose an effective social based updatable filtering protocol (SAFE) with privacy preservation in MSNs. Specifically, we firstly construct a filter Hash tree based on the properties of Merkle tree. Then, we exploit social relationships, and select those users with more than a specific number of common attributes with the filter creator. The selected users are able to store filters in order to block spams or relay regular packets. Furthermore, we develop a cryptographic filtering scheme without disclosing the creator s private information or interests. In addition, we propose a filter update mechanism to allow users to update their distributed filters in time. The security analysis demonstrates that the SAFE can protect user s private information from filter s disclosure to other users and resist filter forgery attack. Through extensive trace-driven simulations, we show that the SAFE is effective and efficient to filter spam packets in terms of delivery ratio, average delay, and communication overhead. I. INTRODUCTION Mobile Social Networks (MSNs) [] are emerging social networking platforms that enable information sharing and social interaction among surrounding neighbors via Bluetooth or WiFi modules on their equipped smartphones. MSN applications engage in our daily life, and help people discover friends, exchange traffic, shopping or health information, and even share image or video files with each other. Simultaneously, many stores and service providers usually broadcast their service information, like advertisements or flyers, most of which might be considered as spams in the eyes of users. For example, Alice is looking for cosmetics on sale in a business street. She only needs the service information of cosmetic stores rather than the restaurants or groceries. Intuitively, Alice can send some filters including her requirements to other people for selecting the useful service information and blocking the useless advertisements. But the question is: who can help Alice? On the other hand, during the lunch time, she requires the information of the nearby restaurants instead. Since the requirements from Alice vary with time due to some personal reasons, the second question comes: how can Alice update the previous filters in a timely fashion? Therefore, an effective spam packet filtering protocol with an update mechanism is essential to block spam information and reduce communication costs. In the last decade, researchers develop many spam filtering protocols. Some sophisticated filtering protocols use blacklist [2], whitelist, or graph [3] to extract spam or admit legitimate senders. On the other hand, some research works focus on content filtering either by using keyword list [4] to match spam packets, or through machine learning, like Bayesian approaches [], to probabilistically detect spams. Recently, social characteristics are introduced to enhance the filtering effectiveness. Li et al. [6] introduce a social network based filter framework (SOAP) to detect spam s by employing social closeness, social dis(interest) and trust management. They collect and utilize social information to distinguish regular and spam s. Sirivianos et al. [7] also exploit social trust to achieve collaborative spam filtering. The trustworthiness of spam reporters could be used to resist Sybil attack and gather the correct spam reports. However, these protocols [6], [7] rely on an online trusted third party or Bayesian approaches [], which require a large number of history log. As a result, most of the existing filtering protocols are inefficient and impractical when being applied in MSNs. Recently, Lu et al. [4] propose, a decentralized keyword based filtering protocol in Delay Tolerant Networks (DTNs). The lets relay users store the filters and detect spam packets before they are transmitted to the destinations. Simultaneously, the encrypted keyword filters preserve user privacy. Nevertheless, the neither efficiently distributes filters, nor dynamically updates the distributed filters. At the same time, security concerns raise many challenges when designing protocols for MSNs. For example, if the filters distributed by Alice include some sensitive or private information, such as preferences or health condition, other people would easily obtain them and violate Alice s privacy. Alice might suffer from a huge amount of loss. In addition, some malicious users might try to forge and re-distribute Alice s filters in order to block regular packets and enable spam packets diffuse, which produce extra communication cost and degrade the network performance. The existing filtering protocols, including the, have not addressed filter forgery attacks before. Therefore, these challenging issues motivate us to further improve filtering effectiveness and enhance the security level. In this paper, we propose an effective social based updatable filtering protocol (SAFE) with privacy preservation in MSNs. The SAFE is characterized by social based filter distribution, private keyword filtering, and efficient filter update. Specifi /3/$3. 23 IEEE 64

2 cally, the major contributions of this paper are twofold. Firstly, we exploit Merkle tree and develop a filter authentication scheme to resist the filter forgery attack. Furthermore, based on social relationship, like common attributes, filters are purposefully distributed, which reduces the filter transmission overhead. Then, we propose Merkle tree based filter update mechanism in the SAFE to cope with the variation of user s filtering requirements. Secondly, we evaluate the performance of the proposed SAFE protocol through extensive trace-driven simulations. Our simulation results validate that the SAFE reduces the communication and storage overheads and guarantee the regular packet delivery with a reasonable delay. In addition, the security analysis demonstrates that the SAFE can preserve user s privacy against inside curious attackers and resist the filter forgery attack. The remainder of this paper is organized as follows: Network model and design goals are presented in Section II. In Section III, we present the details of the SAFE, followed by the security analysis and the performance evaluation in Sections IV and V, respectively. Finally, Section VI closes the paper with concluding remarks. II. PROBLEM DEFINITION In this section, we formulate the network model and identify our design goals to improve filtering efficiency and satisfy the security requirements. A. Network model We consider a homogenous MSN consisting of a trust authority (TA) and N mobile users. The details of these components are presented as follows. Trust Authority (TA) is a trustable, powerful, and storagerich entity, and bootstraps the entire network in the initialization phase. Afterwards, TA will not be involved in communication and filtering. When bootstrapping, TA generates secret master keys, which are going to be used for individual legitimate user to produce the session keys. In addition, TA issues legal certificates to legitimate users after their registration. During the operating time, TA will receive attack reports from mobile users if they detect some malicious users. Mobile users are denoted by U = {u,u 2,..., u N }. Each mobile user is equipped with a portable communication and storage device. Suppose that these devices bi-directionally communicate with each other within the equal communication range. Due to the practical constraints, the power and storage occupancy of such devices are limited. An individual mobile user should first register to TA for the profile and key information. For example, each legitimate user will obtain a unique identity, certificates and key materials which should be securely kept and used in each session to generate session keys. In packet transmission and filtering phases, mobile users should be able to not only produce their own identity and filter signatures but also verify other users identities. B. Threat model Malicious users exist in the whole network, and get involved in both packet delivery and spam filtering phases. We address two types of attacks: inside curious attack (ICA) and outside forgery attack (OFA). In specific, some of the filter holders are curious about other users personal interests or profiles. The goal of them is to illegally obtain other users private or sensitive information. We focus on the privacy issues during filter storage and packet delivery and filtering phases. On the other hand, some outside adversaries are not able to obtain other users profiles and filters. But they are likely to forge some filters to block the regular packets or enable spam packets diffuse in MSNs, which consumes a large amount of communication overheads. C. Design goals Our design goal is to develop an effective and updatable filtering protocol in MSNs. The user privacy should be preserved at the same time. ) Efficiency goals: Due to the intermitted end-to-end connection and constrained resources, we aim to design an effective and efficient filtering scheme to block the spam packets in MSNs. The proposed protocol should efficiently block such spam packets without using too many extra communication, storage, and computing overheads. Furthermore, the useful packets should be neither filtered nor delayed during the transmission. In addition, the distributed filters should be as fresh as possible and efficiently updated if the filter creator changes the former filters. 2) Security goals: Our security goal is to protect from ICA and OFA. On one hand, the proposed filtering protocol should preserve the filter creator s privacy from disclosing. The filters cannot appear in plaintext when distributed to other users. When filtering, the keyword should be securely kept in ciphertext. On the other hand, the filter authentication mechanism should be established and enable users to verify every filter s validity. Any forged filter can be detected by mobile users. III. PROPOSED SAFE PROTOCOL In this section, we present the details of our proposed SAFE protocol. Firstly, we propose a privacy-preserving filter authentication scheme, which protects from modifying filters. Furthermore, we explore social relationship to efficiently distribute filters. We then concretely present an effective filter update mechanism. A. Filter Authentication Scheme To authenticate user s filter, we take the advantage of Merkle tree [8], a chain of cryptographic Hash. In this section, we will elaborate procedures of constructing a filter Hash tree and propose a Hash tree based filter authentication scheme. Merkle tree is a binary tree with 2 N leaf nodes, where N is the depth of Merkle tree. Any parent node h i j = H(h i h j ), is the one-way Hash value of its two children nodes. For example, in Fig., given the leaf node h and 2 646

3 h -2 h h 2 Fig.. h -8 h -4 h -8 h 3-4 h 3 h 4 h -6 h h 6 Hash tree based filter authentication h 7-8 h 7 h 8 h 2, their parent node h 2 = H(h h 2 ). Then, h 2 and h 3 4 are concatenated to obtain h 4. Similarly, the root node h 8 = H(h 4 h 8 ). Finally, the path from the leaf node h to the root h 8 is stored as PH = {h 2,h 3 4,h 8 }. An individual user u i can establish its own keyword list W ui = {W ui,,...,w ui,k}, where W ui,k( k K) is the keyword selected by u i. These keywords are set as the leaf node in filter tree FR ui. During the authentication, the path information PH k is used as the certificate for each independent keyword. Other users check whether the concatenated hash value of PH k is equal to the root R ui or not. If so, the keyword is valid; otherwise, it is forged. Finally, the concatenated value of H(R ui ID ui ) is set as the creator u i s certificate. As a result, the identifier (root value) and the path from the root to every leaf node are verifiable. Suppose a Hash tree consisting of 2 N leaf nodes, N Hash operations are required for each independent verification. In addition, the signature size is N L, where L is the length of Hash value. B. Social Based Private Filtering As discussed above, not only could the spam packets consume the communication and storage overhead, but also would the filters take a large number of transmission and storage. In this section, we will solve the question: How to efficiently distribute the filters and preserve user s privacy? Initialization: When bootstrapping, TA assigns key materials to each user. Let G and G 2 be two cyclic groups with the same order q, and P be a generator of G. Suppose there exists a bilinear pairing [9], [] between G and G 2 that can be efficiently calculated: e: G G G 2, such that e(ap, bp )=e(p, P) ab for random numbers a, b Z q, P G. A bilinear parameter generator G is a probabilistic algorithm [] that gets a security parameter K as input, and outputs a tuple (q, G, G 2, e, G, P, H ), where q is a large prime. Filter generation: The creator u i firstly selects a random number x i Z q, and calculates its public key as PK i = x i P. The private key SK i is x i. Given a keyword W ui,k, its filter is F ui,k =< W ui,k,λ >, where W i = H(W u i,k) x i+h (W ui,k) P, λ = e(pk i,p). Filter distribution: When u i meets another user u j, they do the authentication and private match their profiles to determine the amount of common attributes. If they have more than TH common attributes, where TH is a preset threshold, u i sends the filter F i to u j. Algorithm Social based private filtering : Procedure: Social based private filtering 2: u s sends a packet with keyword W x to u i 3: u s and u j are encountered 4: if u j and u i have more than common attributes then : u j will check whether the packet owns the valid keyword or not 6: if u j keeps u i s filter then 7: u s sends Λ s = λ + PK i to u j 8: u j calculates e(λ s, W i ) 9: if e(λ s, W i )=λ then : u s duplicates the packet to u j : else 2: u j blocks this packet 3: end if 4: else : u s duplicates the packet to u j 6: end if 7: end if 8: return VSS = {VSS,VSS 2,..., V SS M } 9: end procedure Algorithm 2 Filter update : Procedure: Filter update 2: u i changes its own keyword W ui,k, and constructs a new filter tree FR u i with the root node R u i 3: if The encountered user u j is keeping u i s keyword W ui,k then 4: u j sends R ui to u i for the authentication : if R ui is valid then 6: if R ui R u i then 7: u i duplicates FR u i to u j 8: u j updates the kept u i s filter as FR u i 9: end if : else : u j forged u i s filter 2: end if 3: end if 4: end procedure Filtering: When a sender u s would like to send a packet with keyword W x and meets u j, u j will help u i to detect whether this packet should be blocked or not. u s firstly sends Λ s = λ +PK i to u j, where λ = H P. (W x) Upon receiving Λ s, u j checks e(λ s, W i ) =? λ. If it holds, the keyword W x passes the filter check and the packet can be forwarded by u j ; otherwise, this packet will be blocked. The details of the SAFE are illustrated in Algorithm. C. Efficient Filter Update The users might change their former filters. In that case, the filters should be efficiently updated as quickly as possible in order to successfully block or relay the coming packets. In this section, we will answer the question: How to quickly update the filters? According to the properties of Merkle tree, the root will change if any leaf node varies. As a result, we do not need to check every keyword one by one. The creator u i checks the root R ui of u i s filter tree FR ui stored by its filter holder u j. If the root is different, u i sends the updated filter tree FR u i to u j as illustrated in Algorithm 2. Therefore, the SAFE will dramatically improve the searching efficiency in the phase of filter updating

4 IV. SECURITY ANALYSIS In this section, we will discuss privacy and security properties of our proposed SAFE protocol. We will focus on the two types of attacks discussed in section II. Inside Curious Attack: To protect from ICA, each filter cannot be duplicated to others as plaintext. To achieve the privacy-preserving goal, the SAFE encrypts the user s filters based on bilinear pairing. The relay user u j can effectively check whether the keyword exists in u i s filter or not without disclosing any u i s information. We have e(pk i,p) = e( x i P, P) =e(p, P) x i. e(λ s, W i ) H (W = e(λ + PK i, x i + H (W P ) = e( H (W x ) P + H (W P, x i x i + H (W P ) = e( x i + H (W x ) H (W P, H (W x )x i x i + H (W P ) e(p, P) x i, If W ui,k = W x ; = [x i +H (Wx)]H (W ui,k ) H e(p, P) (Wx)x i [x i +H (W ui,k )], otherwise. The packet with valid keywords will be forwarded by u j, while others will be blocked. Due to the properties of elliptic curve groups and bilinear pairing, it is infeasible to calculate H (W from W i = H(W u i,k) x i+h (W ui,k) P. Therefore, the keyword is securely kept so that the creator u i s sensitive and private information is preserved. Outside Forgery Attack: the SAFE resists filter forgery attack by using Merkle tree based filter authentication. The root value of each Merkle tree is the concatenated hash value of the nodes in a specific path, and it is the unique certificate H(R ui ID ui ) created by the filter creator u i. Any user can verify this root value by using the creator s public key. As a result, each leaf node, which is the independent keyword, is uniquely defined and verifiable with its hash tree path information. Once the creator u i changes the former filters, the new certificate is updated as H(R u i ID ui ). Before the update in each u i s friends, the former certificate is still valid. The resilience of OFA is based on the security level of hash function used to construct the Merkle tree. From the above security analysis, the SAFE protects user privacy from being disclosed or eavesdropped by the ICA or outside attacks. Merkle tree based authentication scheme resists the outside forgery attacks with tolerant communication and computing overheads. Note that we do not consider the privacy issues during profile matching [2]. In addition, TA operates in an off-line manner, and generates the essential cryptographic master keys in the initialization phase. Therefore, the SAFE can securely operate in a decentralized manner. V. PERFORMANCE EVALUATION To evaluate the effectiveness and efficiency of the SAFE, we simulate it through Infocom6 trace [3]. A. Simulation Setup The Infocom6 trace [3] contains 78 mobile users in a conference during four days. Each mobile user is equipped with a dedicated Bluetooth device, which can detect the Bluetooth devices appearing in the proximity. As a result, the mobility and contacts of these mobile users can be recorded in the log. We collect 28, 979 useful contacts, and divide them into two portions: the first one third of the data set as a training set producing user s attributes and the residual data as the experiment set used for the simulation. Then, we utilize maximal clique to define attributes. We select attributes each of which contains more users and the sum of all the edges is large enough. We simulate the SAFE with these attributes in the later simulation. Each of these selected attributes consists of at least 28 users, while each user participates in 38 communities on average. B. Simulation results We evaluate the performance of our proposed SAFE protocol compared with and protocols. Each mobile user generates 78 packets with different keywords according to their attributes. As Fig. 2(a) and 2(b) shown, the SAFE achieves higher delivery ratio with higher delay compared with. protocol, where a user distributes filters to any encountered ones, gains the highest delivery ratio and lowest delay, but it consumes too many communication and storage overheads to be operated in the real world. With different THs, which are equal to the number of common attributes that both users have, delivery ratio and average delay do not change at all. The reason is that the SAFE forwards packets according to the common attributes of the destination. The change of TH only impacts on the number of distributed filters rather than the filters themselves. As a result, the useful packets cannot be filtered at any time. In Fig. 2(c), we can observe that the SAFE with TH =2 blocks more spam packets, while the SAFE with TH = blocks much fewer spam packets. As shown in Fig. 2(d), the SAFE with TH =dramatically reduce the communication costs. Even though the SAFE with TH =2blocks more spam packets as shown in Fig. 2(c), it still leads to a large number of copies. Since the distributed filters decreases with TH =2, more mobile users not having the relevant filter generate more spam packets. Furthermore, from Fig. 2(c) and 2(d), the SAFE with TH = trades off the number of blocked spam packets and the number of copies compared with other protocols. In Fig. 2(e), the number of distributed filters increases with the growth of threshold TH. The smaller TH of distributing filters causes more users qualified to hold filters. The and (denoted as PF and Ep in Fig. 2(e), respectively) filtering schemes distribute more filters to mobile users. This is because the SAFE purposely distributes the filters to the users having some common attributes with the destinations. As shown in Fig. 2(f), the higher TH results in more copies during transmission. Since the higher threshold limits the 4 648

5 Delivery ratio (%) SAFE TH= SAFE TH= Average delay () SAFE TH= SAFE TH= Number of the blocked spam packets SAFE TH= SAFE TH=2 PreFilter Copy number of the transmitted packets SAFE TH= SAFE TH= (a) Delivery ratio (b) Average delay (c) Number of the blocked spam packets (d) Number of copies Number of filters Ep PF (e) Number of filters vs. TH Number of copies x Number of blocked spam (f) Number of copies vs. TH (g) Number of blocked packets vs. TH Fig. 2. Performance comparison Number of Search operation Binary Search SAFE Number of filters (h) Update comparison amount of distributed filters, fewer filters cannot resist the flooding of spam packets. In Fig. 2(g), the growth of TH results in more blocked spam packets. When TH is small, for example, or, many users hold filters so that they will not produce spam packets at all. In such case, spam packets are blocked in the phase of producing. When TH increases, not that many users keep these filters. As a result, the amount of produced spam packets increases, and the distributed filters can block more spam packets. With the continuous increase of TH, fewer users hold filters. Not only do the produced spam packets increase, but also will the filtering capability degrade. This is the reason why the further growth of TH causes the decrease of the blocked spam packets when TH is greater than 4. Therefore, the SAFE with TH =achieves the trade-off between the amount of distributed filters and the number of copies, and effectively blocks spam packets. In Fig. 2(h), the SAFE performs fewer search operation when update filtering, since the only operation is to check the root of Merkle tree. Other algorithms, like binary search algorithm, performs considerable operations when the number of distributed filters increases. Therefore, the effectiveness and efficiency of the SAFE is demonstrated from the above simulation results. VI. CONCLUSION In this paper, we have proposed a social based updatable filtering protocol (SAFE) with privacy- preserving in MSNs. Firstly, analyzing the social relationships among users, we have introduced common attributes to effectively and efficiently distribute filters. According to Merkle tree, the SAFE updates the filters to adjust the various requirements from users. Furthermore, the security analysis demonstrates that user s private information embedded in the filters can be protected, while the extensive simulation results show that the SAFE can significantly reduce communication and storage overhead with high efficiency and low delay. To the best of our knowledge, this paper is the first work addressing filter update in MSNs. In our future work, we intend to explore the adaptive filter update to further improve the update efficiency. REFERENCES [] X. Liang, X. Li, R. Lu, X. Lin, and S. Shen, SEER: A secure and efficient service review system for service-oriented mobile social networks, in Proc. of IEEE ICDCS, 22, pp [2] F. Soldo, A. Le, and A. Markopoulou, Blacklisting recommendation system: Using spatio-temporal patterns to predict future attacks, IEEE JSAC, vol. 29, no. 7, pp , 2. [3] A. Ramachandran and N. Feamster, Understanding the network-level behavior of spammers, in Proc. of ACM SIGCOMM, 26, pp [4] R. Lu, X. Lin, T. H. Luan, X. Liang, X. Li, L. Chen, and X. Shen, : An efficient privacy-preserving relay filtering scheme for delay tolerant networks, in Proc. of IEEE INFOCOM, 22, pp [] B. Agrawal, N. Kumar, and M. Molle, Controlling spam s at the routers, in Proc. of IEEE ICC, 2, pp [6] Z. Li and H. Shen, SOAP: A social network aided personalized and effective spam filter to clean your box, in Proc. of IEEE INFOCOM, 2, pp [7] M. Sirivianos, K. Kim, and X. Yang, Socialfilter: Introducing social trust to collaborative spam mitigation, in Proc. of IEEE INFOCOM, 2, pp [8] R. Merkle, Protocols for public key cryptosystems, in Proc. of IEEE Symposium on Security and Privacy, Apr. 98, pp [9] Boneh and Franklin, Identity-based encryption from the weil pairing, SICOMP: SIAM Journal on Computing, vol. 32, 23. [] R. Lu, X. Lin, and X. Shen, Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks, in Proc. of IEEE INFOCOM, 2, pp [] F. Zhang, R. Safavi-Naini, W. Susilo, and W. Susilo, An efficient signature scheme from bilinear pairings and its applications. in Proc. of Public Key Cryptography, 24, pp [2] X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, Fine-grained identification with real-time fairness in mobile social networks, in Proc. of IEEE ICC, 2, pp.. [3] J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, and A. Chaintreau, CRAWDAD trace cambridge/haggle/imote/infocom (v ). 649

Electronic Contract Signing without Using Trusted Third Party

Electronic Contract Signing without Using Trusted Third Party Electronic Contract Signing without Using Trusted Third Party Zhiguo Wan 1, Robert H. Deng 2 and David Lee 1 Sim Kim Boon Institute for Financial Economics 1, School of Information Science 2, Singapore

More information

Efficient Unlinkable Secret Handshakes for Anonymous Communications

Efficient Unlinkable Secret Handshakes for Anonymous Communications 보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

Efficient Detection of Ddos Attacks by Entropy Variation

Efficient Detection of Ddos Attacks by Entropy Variation IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,

More information

Signature Amortization Technique for Authenticating Delay Sensitive Stream

Signature Amortization Technique for Authenticating Delay Sensitive Stream Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2

More information

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

Wireless Network Security 14-814 Spring 2014

Wireless Network Security 14-814 Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #8 Broadcast Security & Key Mgmt 1 Announcements 2 Broadcast Communication Wireless networks can leverage the broadcast advantage property

More information

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,

More information

Capture Resilient ElGamal Signature Protocols

Capture Resilient ElGamal Signature Protocols Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

3-6 Toward Realizing Privacy-Preserving IP-Traceback

3-6 Toward Realizing Privacy-Preserving IP-Traceback 3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

New Efficient Searchable Encryption Schemes from Bilinear Pairings

New Efficient Searchable Encryption Schemes from Bilinear Pairings International Journal of Network Security, Vol.10, No.1, PP.25 31, Jan. 2010 25 New Efficient Searchable Encryption Schemes from Bilinear Pairings Chunxiang Gu and Yuefei Zhu (Corresponding author: Chunxiang

More information

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,

More information

Journal of Electronic Banking Systems

Journal of Electronic Banking Systems Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative

More information

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257 Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy

More information

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood One significant impediment to the widespread adoption of public-key cryptography is its dependence on a public-key infrastructure

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,

More information

Secure Communication in a Distributed System Using Identity Based Encryption

Secure Communication in a Distributed System Using Identity Based Encryption Secure Communication in a Distributed System Using Identity Based Encryption Tyron Stading IBM, Austin, Texas 78758, USA [email protected] Abstract Distributed systems require the ability to communicate

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected]. DDoS and IP Traceback. Overview

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 durresi@csc.lsu.edu. DDoS and IP Traceback. Overview DDoS and IP Traceback Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected] Louisiana State University DDoS and IP Traceback - 1 Overview Distributed Denial of Service

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography Liang Yan, Chunming Rong, and Gansen Zhao University of Stavanger, Norway {liang.yan,chunming.rong}@uis.no

More information

ACL Based Dynamic Network Reachability in Cross Domain

ACL Based Dynamic Network Reachability in Cross Domain South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer

More information

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks

Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks JOURNAL PAPER, ACCEPTED 1 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks Huang Lu, Student Member, IEEE, Jie Li, Senior Member, IEEE, Mohsen Guizani, Fellow, IEEE Abstract

More information

[email protected] [email protected]

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn. CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

Efficient Data Transmission For Wireless Sensor Networks

Efficient Data Transmission For Wireless Sensor Networks Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant

More information

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010 Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture

More information

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S [email protected], k [email protected],[email protected] Department of Computer Science,

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

Secure Data Aggregation and Data Recovery in Wireless Sensor Networks

Secure Data Aggregation and Data Recovery in Wireless Sensor Networks International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 49 8958, Volume-, Issue-3, February 3 Secure Data Aggregation and Data Recovery in Wireless Sensor Networks John Major. J, Shajin

More information

HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW

HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW Aejaz Ahmed 1, H C Sateesh Kumar 2 1 M.Tech student, Department of Telecommunication Engineering, DSCE, [email protected]

More information

Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme

Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme Asha A 1, Hussana Johar 2, Dr B R Sujatha 3 1 M.Tech Student, Department of ECE, GSSSIETW, Mysuru, Karnataka, India

More information

Secure Large-Scale Bingo

Secure Large-Scale Bingo Secure Large-Scale Bingo Antoni Martínez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, Av. Països Catalans 26, E-43007 Tarragona,

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor

More information

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK M.Yasodha 1, S.Umarani 2, D.Sharmila 3 1 PG Scholar, Maharaja Engineering College, Avinashi, India. 2 Assistant Professor,

More information

A Road Map on Security Deliverables for Mobile Cloud Application

A Road Map on Security Deliverables for Mobile Cloud Application A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,

More information

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,

More information

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication

More information

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

A Practical Authentication Scheme for In-Network Programming in Wireless Sensor Networks

A Practical Authentication Scheme for In-Network Programming in Wireless Sensor Networks A Practical Authentication Scheme for In-Network Programming in Wireless Sensor Networks Ioannis Krontiris Athens Information Technology P.O.Box 68, 19.5 km Markopoulo Ave. GR- 19002, Peania, Athens, Greece

More information

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique

More information

Cryptography and Network Security Chapter 14

Cryptography and Network Security Chapter 14 Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture

More information

A Novel Packet Marketing Method in DDoS Attack Detection

A Novel Packet Marketing Method in DDoS Attack Detection SCI-PUBLICATIONS Author Manuscript American Journal of Applied Sciences 4 (10): 741-745, 2007 ISSN 1546-9239 2007 Science Publications A Novel Packet Marketing Method in DDoS Attack Detection 1 Changhyun

More information

18-731 Midterm. Name: Andrew user id:

18-731 Midterm. Name: Andrew user id: 18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem

More information

Efficient File Sharing Scheme in Mobile Adhoc Network

Efficient File Sharing Scheme in Mobile Adhoc Network Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained

More information

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Enabling Public Auditing for Secured Data Storage in Cloud Computing IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,

More information

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Identity Based

More information

Security in Structured P2P Systems

Security in Structured P2P Systems P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in

More information

MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC

MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC by Brittanney Jaclyn Amento A Thesis Submitted to the Faculty of The Charles E. Schmidt College of Science in Partial

More information

Signature Schemes. CSG 252 Fall 2006. Riccardo Pucella

Signature Schemes. CSG 252 Fall 2006. Riccardo Pucella Signature Schemes CSG 252 Fall 2006 Riccardo Pucella Signatures Signatures in real life have a number of properties They specify the person responsible for a document E.g. that it has been produced by

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors

More information

Digital Signatures. What are Signature Schemes?

Digital Signatures. What are Signature Schemes? Digital Signatures Debdeep Mukhopadhyay IIT Kharagpur What are Signature Schemes? Provides message integrity in the public key setting Counter-parts of the message authentication schemes in the public

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

Introduction. Digital Signature

Introduction. Digital Signature Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology

More information

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA [email protected] Yunghsiang

More information

The Mathematics of the RSA Public-Key Cryptosystem

The Mathematics of the RSA Public-Key Cryptosystem The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS Ayesha Tabassum 1 1 Assistant Professor, Department of Computer Science and Engineering, DCET, Osmania University, Telangana, India Abstract

More information

An Investigation of DOS Flooding Attack in VANET.

An Investigation of DOS Flooding Attack in VANET. A B S T R A C T International Journal of Advance Foundation and Research in Computer (IJAFRC) An Investigation of DOS Flooding Attack in VANET. Vikash Porwal, Rajeev Patel, Dr. R. K. Kapoor. National Institute

More information

Secure Routing in Wireless Sensor Networks

Secure Routing in Wireless Sensor Networks Secure Routing in Wireless Sensor Networks Introduction to Wireless Sensor Networks Ida Siahaan / Leonardo Fernandes DIT Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks

More information

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August

More information

Compter Networks Chapter 9: Network Security

Compter Networks Chapter 9: Network Security Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau

More information

Access Control And Intrusion Detection For Security In Wireless Sensor Network

Access Control And Intrusion Detection For Security In Wireless Sensor Network Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.

More information

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,

More information

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy

More information

Certificate Based Signature Schemes without Pairings or Random Oracles

Certificate Based Signature Schemes without Pairings or Random Oracles Certificate Based Signature Schemes without Pairings or Random Oracles p. 1/2 Certificate Based Signature Schemes without Pairings or Random Oracles Joseph K. Liu, Joonsang Baek, Willy Susilo and Jianying

More information