A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sahoo, G.
- Enhancement of Concealed Data Aggregation for Multiple Applications to Prevent Vulnerabilities in Wireless Sensor Networks
Authors
1 Birla Institute of Technology (MTech Student, Dept. of Computer Sc. & Engg.) Ranchi, PO-835215, IN
2 Birla Institute of Technology, Ranchi, PO-835215, IN
Source
Networking and Communication Engineering, Vol 7, No 5 (2015), Pagination: 216-223Abstract
Data Aggregation is an important aspect in Wireless Sensor Networks WSNs and this is because it reduces the amount of data to be transmitted over the network. This is done by either avoiding the transmission of redundant data or aggregating the result from different sensors and forwarding only the aggregated result further to BS. In previous studies authors used homomorphic encryption properties for concealing communication during aggregation such that encrypted data can be aggregated algebraically without decrypting them. These schemes are not satisfying multi applications which lead to proposal of CDAMA (Concealed Data Aggregation for Multi Applications). It is designed for multi applications, as it provides secure counting capability and also it reduces the effect of compromising secrets of a single application. In wireless sensor networks or environments the sensor nodes are defenseless and are vulnerable to some attacks. Considering the security aspect of wireless environments we have used Dynamic Intrusion Detection Protocol Model (DYDOG) and a modified key generation procedure that uses Digital Signatures and Two Fish Algorithms along with CDAMA for enhancement of security and throughput. To prove our proposed scheme’s robustness and efficiency, we conducted the simulations, comprehensive analysis and comparisons in the end.
Keywords
Concealed Data Aggregation, Digital Signatures, DYDOG, Wireless Sensor Networks.- An E-Epidemic Model for Developing a Defense Mechanism against Computer Worms
Authors
1 Department of Information Technology, Birla Institute of Technology, Mesra, Ranchi-835 215, IN
2 Department of Applied Mathematics, Birla Institute of Technology, Mesra, Ranchi-835 215, IN
3 Department, Department of Information Technology, Birla Institute of Technology, Mesra, Ranchi-835 215, IN
Source
Networking and Communication Engineering, Vol 3, No 6 (2011), Pagination: 433-435Abstract
We have developed a defense mechanism for worms free computer network. The trusted hosts are peer to peer connected but gateways, firewalls, routers and trusted hosts are hierarchically related with each other. For worms free computer network, we have developed a mathematical model in which different computer network devices like Gateways, Firewalls, and Routers etc are used as parameters. The concept of trusted hosts have been used to help routers and firewalls for transmission of alarming signals. To detect and filtrate the worms, firewall and routers are used. The gateways have been used to connect the different type of LAN. Some host may not have alarming message, so that hosts may be either infected or completely free from worms. Further some infected hosts have been filtered by single level hierarchical back off dynamic mechanism. Finally heavily attacked worms related host have to quarantine. In all type of hosts, the concept of natural death has been used.