SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Mr.P.Kanagaraju et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.117-121
www.ijera.com 117 | P a g e
Secure Cluster Based Routing Using SAT/ILP Techniques and
ECC EL-Gamal Threshold Cryptography in MANET
Mr. P. Kanagaraju. Me, (Ph. D)*, Dr. R. Nallusamy Ph.D.**, Nandini. D. K***
*Department of Computer Science, K.S.Rangasamy college of Technology, Thiruchengode
** Professor
***Department of Computer Science, K.S.Rangasamy college of Technology, Thiruchengode.
ABSTRACT
The Elliptic curve cryptography ( ECC) a promising and important because it requires less computing power,
bandwidth, and also the memory when comparing to other cryptosystems The clustering algorithm using the
Integer Linear Programming (ILP) and Boolean Satisfiability (SAT) solvers. These improvements will secure
the application of SAT and ILP techniques in modeling composite engineering problem that is the Clustering
Problem in Mobile Ad-Hoc Networks (MANETs). The Clustering Problem in MANETs consists of selecting the
most appropriate nodes of a given MANET topology as clusterheads, and ensuring that regular nodes are related
to clusterheads such that the lifetime of the network is maximized. In which, discussing SAT/ILP techniques for
clustering techniques and ECC El Gamal Threshold Cryptography for the security. Through our implementation,
explored the possibility of using ECCEG-TC in MANETs.
Keywords - Boolean Satisfiability, Elliptic curve cryptography, ECC El Gamal Threshold Cryptography
Integer Linear Programming.
I. INTRODUCTION
Mobile ad hoc networks (MANETs) are
vulnerable to various attacks including denial-of-
service attacks because of wireless nature of these
networks. Devices with constraint resources add to its
vulnerability. To ensure availability of nodes,
threshold cryptography can be implemented in these
networks so that even if some of the information is
lost still the actual message reaches the intended
receiver without compromising security in terms of
secrecy, reliability, and genuineness.
Elliptic Curve Cryptography (ECC) was first
proposed by victor Miller and independently by Neal
Koblitz in the mid-1980s and has evolved into a
mature public-key cryptosystem. Distinguish to its
conventional counterparts, ECC offers the same level
of security using security.
Threshold cryptography achieves the
security needs such as confidentiality and integrity
against malicious nodes. It also provides data
integrity and availability in a hostile environment and
can also employ verification of the correct data
sharing. All this is achieved without revealing the
secret key. Thus, taking into consideration these
characteristics, implementing TC to secure messages
seems a perfect solution in MANETs.
For the past few decades, Integer Linear
Programming (ILP) and Boolean Satisfiability (SAT)
solvers have enhanced a lot through the beginning of
new intelligent algorithms that allowed the solvers to
handle a wider range of difficult Engineering based
problems. Mainly one of such problem is clustering
in Mobile Ad-Hoc Networks (MANETs).
Cryptography is transforming a information it into an
unreadable format in which a message can be
concealed from reader and only the intended recipient
will be able to convert it into original text. Its main
goal is to keep the data secure from unauthorized
access. Data can be read and understood without any
special measures are known as plaintext. Hiding
information into the plaintext is called encryption.
Encrypted plaintext information into an unreadable
garbage known as cipher-text. Reverting process of
cipher text to its original plaintext is called
decryption. A system provides encryption and
decryption is called cryptosystems. Cryptography
provides number of security goals to ensure the
privacy of data, on-alteration of data and so on.
Types of various goals of cryptography are below
Confidentiality
Maintaining a secret communication
between the two authorized persons.
Authentication
Checking the identity of the information
from the legitimate or authentication ID.
Data Integrity
Verifying the information that has not been
altered by unauthorized which means no one in
between the sender and receiver are allowed to alter
RESEARCH ARTICLE OPEN ACCESS
Mr.P.Kanagaraju et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.117-121
www.ijera.com 118 | P a g e
the given message.
Non Repudiation
Thus when a message is sent, the receiver
can prove that the message was in fact send by the
suspected sender. Correspondingly, when a message
is received, the sender can prove the suspected
receiver in fact received the message.
Access Control
Only the certified parties are able to right to
use the given information
.
II. Integer Linear Programming And
Boolean Satisfiability
Integer Linear Programming (ILP) involves
maximizing or minimizing a function with respect to
certain constraints where the optimal function and
constraints are linear and the used variables can only
take integer values [2]. Cases where the integer
values are restricted to (0–1) are called Binary ILP
Problems. In SAT the constraints between variables
are represented using what is called propositional
logic. It involves the use of AND, OR and NOT
operations to construct formulas in the Products-of-
Sums form or Conjunctive Normal Form (CNF). The
variables can only take Binary values (0–1). Given
constraints articulated in CNF, the ambition is to spot
a variable obligation that will satisfy all constraints in
the problem or verify that no such task exists. To
assure or to solve, SAT will go all the way through
the hunt space and conclude whether or not there is a
fulfilling variable assignment. Superior decision
heuristics and clever inconsistency analysis
techniques can be used to evade probing through the
complete tree of 2n assignments.
It proposes an ILP formulation of the
clustering problem, structure on the ideas and
assumptions put forward in the EEC-CB model
presented in this model improves on weaknesses
present in the EEC-CB model and adds idleness
through the use of a Star-Ring backbone. In addition,
a proposed enhancement allows coverage to be taken
into account.
Proposed Base Model
Variables are maintained below as:
− N: Total number of nodes in the network
(predetermined)
− P: Number of clusters heads (predetermined)
− di j : Euclidean distance between nodes i and j
− K : Max number of nodes that can be connected
to a CH (predetermined)
− ci j : Cost of connecting a regular node i
to CH j (proportional to di
2
j)
− h j k : Cost of connecting CH j to CH k
(proportional to d3
jk )
The assumptions which were made above in
the ILP formulations are also valid to the proposed
ILP formulation. Variable b, in the intention role,
which represents the level of the node’s capability to
act as a cluster head, gets its value from an external
source (algorithm, tool, etc). This is useful as
multiple approaches or algorithms, which decide the
suitability of a node in acting as a cluster head, can
be combined with this model without altering the
equations, even though this is out of the range of
research. Then it is unspecified that nodes are able to
resolve each other’s spot.
Fig. 1 Star-ring backbone.
Intra Cluster Communication Enhancement
Intra Cluster communication is introduced
for two issues. First is that the most important
accountability of the cluster head should be to route
communication among clusters and not inside a
cluster. The aim is for the cluster head to preserve as
much energy as achievable for the contact between
clusters, allowing it to last longer in its position as a
cluster head. The second cause after enhancing the
intra cluster contact is that should a cluster head fail,
the nodes inside a cluster will be able to
communicate.
Multihop Connections Enhancement
Multihop connections are introduced into
the formulation to permit longer, extra exclusive
links to be replaced by shorter less costly links.
relatively than attach straight to a cluster head which
is further away, it is preferable to make a lesser cost
link to a cluster head during another regular node.
Though, the in-between regular node will now, in a
sense, act like a second tier cluster head as it will
route the communication of the regular node through
it to the cluster head. Price of this routing must be
taken into explanation. After that objective function
is used to integrate the cost of multihop connections
to the proposed Star-Ring base model.
Coverage Enhancement
The proposed Base Model can be extended
to take into account the coverage radius of the nodes
Mr.P.Kanagaraju et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.117-121
www.ijera.com 119 | P a g e
in the system, and make sure that links are
recognized only between nodes that are within each
other’s exposure radius. Likewise the same manner in
which the distances between nodes are used to
determine the price of the links, it can also be
compared to the exposure radius of each node and
used to Sample MANET topology.
III. Ecc Elgamal Tc (Ecceg-Tc)
The ELGamal public-key encryption scheme
can be viewed as Diffie-Hellman key agreement
protocol in key transmit mode. Its protection is based
on the intractability of the discrete Logarithm
Problem (DLP) and the Diffie-Hell man problem.
EC-ELGamal protocol implemented for safe
communication. One essential tip is to note is unlike
ECDH protocol, this protocol does not create
common key, but using EC-ELGamal protocol a
message M=(M1,M2),a point on elliptic curve, can
be sent from Bank to Alice and vice versa.
Performing the decrypting, reverse the
embedding process to create the message M starting
to the point P. It is not trivial to find a point M for the
communication. Communication that is difficulty in
obtaining the private key from the public key is based
on the discrete log problem (DLP) for elliptic curves.
The ELGamal digital signature scheme:
The ELGamal signature algorithm is similar
to the encryption algorithm in that the public key and
private key have the same form; however, encryption
is not the same as signature verification, nor is
decryption the same as signature creation as RSA.
In following sections, our goal is to implement ECC
based ElGamal threshold cryptography (ECCEG-
TC). In this algorithm, key is not shared because the
public as well as private keys are in form of points
and we cannot apply Lagrange on the points
altogether to split message or to combine it. Hence,
ECCEG-TC for message splitting before encryption
is simulated for MANET environment and then it is
compared with performance of RSA-TC. The ECC El
Gamal Threshold cryptography (ECCEG-TC)
algorithm is briefly explained.
ECCEG-TC Message Split before Encryption
Algorithm
Suppose that the ECC has a point G on an
elliptic curve E
p
(a, b), and the order of G is q. p is a
large prime.
Bob’s private key and public key are n
B
, 0 < n
B
< q,
and K
B
= n
B
G.
• First we choose a prime number p > max(M, n),
and define a
0
= M, the message. Then we select k
- 1 random, independent coefficients a
1
, a
2
,…a
k -
1
, 0 ≤ a
j
≤ p-1, defining the random polynomial
f(x) over Zp, a Galois prime field GF(p).
• We compute n shares, M
i
= f(x
i
) mod p, 1≤ i ≤ n,
where x
i
can be just the public index i for
simplicity, and convert them to points P
i
on
elliptic curve E
p
(a, b).
• Alice picks a random number r, and sends rG
and P
i
+ rK
B
to Bob with index t.
• Bob recovers each elliptic curve point by
calculating P
i
+ rK
B
– n
B
rG = P
i
.
• Bob converts P
i
to M
i
, and deduces M by using
Lagrange interpolation formula M.
ECCEG-TC Implementation
ECCEG-TC,to select the ECC parameters,
i.e. a, b, p, widely accepted NIST curves were
selected for implementation for 192, 224, and 256
bits. For conversion of message to and from ECC
point, method discussed by Kobiltz is used such that
(kappa*M)mod p < x <(kappa*(M+1))mod p, where
(x, y) is a point on elliptic curve. In our ECCEG-TC
implementation, kappa is fixed to 2
8
. To retrieve a
message from a ECC point (x, y), M= x/kappa mod p
is used.
For calculating the shares and for combining
partial messages, Shamir’s Lagrange interpolation
scheme is implemented. For its polynomial, the
coefficients are randomly generated over the modulus
p. The co-efficient zero depends on the x and y values
of ECC point information that needs to be transmitted
based on ECC algorithm used. As against RSA
algorithm where we are sharing the keys, in ECC-TC
implementation, the partial shares of the message are
generated and then encrypted to get ECC point.
Cryptography is transforming a information it into an
unreadable format in which a message can be
concealed from reader and only the intended recipient
will be able to convert it into original text. Its main
goal is to keep the data secure from unauthorized
access.
IV. Performance Results Performance
Results
Fig. 2 Topology generated by the ILP formulation
without coverage constraints.
Mr.P.Kanagaraju et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.117-121
www.ijera.com 120 | P a g e
Fig. 3 Topology generated by the ILP formulation
with coverage constraints.
Fig.4 illustrates that with increase in ECC
key size, the total encryption timings increase
gradually for given n and t. For constant key size and
n, the encryption timings increase with t as the time
to generated Lagrange polynomial and respective
message shares increases accordingly.
Fig. 4 Total Encryption Timings for ECCEG-TC
Fig. 5 shows that the share generation
timings increase with increase in key size or with n or
t. Share generation timings are very small compared
to the encryption timings.
Fig. 5 Share Generation Timings for ECCEG-TC
Combination time is the time required to
combine t partial messages using Shamir’s Lagrange
interpolation method to retrieve original message.
From Fig. 6, the total decryption and combination
timings increase gradually with increase in t for
constant key size and n. This increase is due to time
required to decrypt and combine additional partial
messages as t is increased. Increase in the key size
results in proportional increase in the decryption
timings irrespective of n and t.
Fig. 6 Decryption and Combination Timings for
ECCEG-TC
Number of point addition of ECCEG-TC
increases with n resulting into proportionate increase
in addition timing in encryption and decryption as
seen in Fig. 4 and Fig. 6. The time required
converting message to point and vice-versa is
significantly small compared to encryption and share
generation time and hence not shown separately. In
ECCEG-TC, the Lagrange is carried over prime field
p, hence the success rate is 100% as all the partial
messages are recovered without any issue of inverse
calculation.
V. Conclusion
An improved ILP formulation to solve the
clustering trouble in MANETs. The future model
offered the utilize of a Star-Ring backbone. In
addition, the planned formulation incorporated the
ability to enforce coverage constraints to ensure that
only connections that are within the physical
limitations of the node are established. Applications
of MANETs are on rise and hence it is necessary to
provide security to this vulnerable wireless networks.
And by further exploring and implementing ECC
ELgamal threshold cryptography algorithms, its
shown that secure MANETs are feasible.
References
[1] S. Chinara and S. Rath, “Energy efficient
mobility adaptive distributed clustering
algorithm for mobile ad hoc network,” in
Proc. Int. Conf. Adv. Comput. Commun.,
2008, pp. 265–272.
[2] A. Schrijver, Theory of Linear and Integer
Programming.New York, NY, USA: Wiley,
1999.
[3] F. Aloul, A. Ramani, I. Markov, and K.
Sakallah, “Generic ILP versus specialized 0-
1 ILP: An update,” in Proc. Int. Conf.
Comput.-Aided Design, 2002, pp. 450–457.
[4] D. Chai and A. Kuehlmann, “A fast pseudo-
Mr.P.Kanagaraju et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.117-121
www.ijera.com 121 | P a g e
[5] Boolean constraint solver,” IEEE Trans.
Comput.-Aided Design Integr. Circuits Syst.,
vol. 24, no. 3, pp.305–317, Mar. 2005.
[6] A. Sagahyroon, F. Aloul, and A. Sudnitson,
“Using SAT-based tech-niques in low
power state assignment,” J. Circuits, Syst.,
Comput, vol. 20, no. 8, pp. 1605–1618,
2011.
[7] Yufang Huang, “Algorihtm for elliptic
curve diffie-Hellman key exchange based
on DNA title self assembly In Proceedings
of 46th
IEEE Theories and
Applications,pp.31-36, 2008.
[8] A. M. Fiskiran and R. B. Lee. “Workload
characterization of elliptic curve
cryptography and other network security
algorithms for constrained environments”.
IEEE International Workshop on WWC-5,
2009.
[9] K. Lauter, “The advantages of Elliptic
Curve Cryptography For Wireless
Security”, IEEE Wireless Communications,
vol. 11, no. 1, Feb. 2004, pp. 62-67.
[10] Y. Desmedt and Y. Frankel, “Threshold
cryptosystems”, in Advances in Cryptology
- Crypto '89, Proceedings, Lecture Notes in
Computer Science 435, G. Brassard, Ed.,
Santa Barbara: Springer-Verlag,1990, pp.
307-315.

Mais conteúdo relacionado

Mais procurados

Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF irjes
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
 
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String Matching
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String MatchingA Novel Framework for Short Tandem Repeats (STRs) Using Parallel String Matching
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String MatchingIJERA Editor
 
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...ijwmn
 
Performance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence DetectionalgoPerformance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence DetectionalgoRahul Shirude
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networksIJECEIAES
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...
Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...
Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...Shankar Lal
 
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor NetworksA Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor Networksijeei-iaes
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
 
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATIONAN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATIONIJCNCJournal
 
Survey on Text Prediction Techniques
Survey on Text Prediction TechniquesSurvey on Text Prediction Techniques
Survey on Text Prediction Techniquesvivatechijri
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
 
A machine learning based protocol for efficient routing in opportunistic netw...
A machine learning based protocol for efficient routing in opportunistic netw...A machine learning based protocol for efficient routing in opportunistic netw...
A machine learning based protocol for efficient routing in opportunistic netw...Fellowship at Vodafone FutureLab
 
A NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIES
A NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIESA NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIES
A NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIESIJNSA Journal
 
If3058 concept and design of genetic cryptography using bdg48
If3058 concept and design of genetic cryptography using bdg48If3058 concept and design of genetic cryptography using bdg48
If3058 concept and design of genetic cryptography using bdg48Satria Ady Pradana
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
 

Mais procurados (20)

Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
 
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String Matching
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String MatchingA Novel Framework for Short Tandem Repeats (STRs) Using Parallel String Matching
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String Matching
 
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
 
Performance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence DetectionalgoPerformance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence Detectionalgo
 
Cv4201644655
Cv4201644655Cv4201644655
Cv4201644655
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networks
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...
Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...
Utilisation of l-Diversity and Differential Privacy in the Anonymisation of N...
 
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor NetworksA Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
 
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATIONAN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
 
Survey on Text Prediction Techniques
Survey on Text Prediction TechniquesSurvey on Text Prediction Techniques
Survey on Text Prediction Techniques
 
E031022026
E031022026E031022026
E031022026
 
5215ijcis01
5215ijcis015215ijcis01
5215ijcis01
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
 
A machine learning based protocol for efficient routing in opportunistic netw...
A machine learning based protocol for efficient routing in opportunistic netw...A machine learning based protocol for efficient routing in opportunistic netw...
A machine learning based protocol for efficient routing in opportunistic netw...
 
A NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIES
A NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIESA NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIES
A NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIES
 
If3058 concept and design of genetic cryptography using bdg48
If3058 concept and design of genetic cryptography using bdg48If3058 concept and design of genetic cryptography using bdg48
If3058 concept and design of genetic cryptography using bdg48
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 

Destaque

Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitudeWith Company
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Destaque (7)

CV of satyendra
CV of satyendraCV of satyendra
CV of satyendra
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitude
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Semelhante a W4301117121

Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice basedijcsa
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...IOSR Journals
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Emmbeded .pdf
Emmbeded .pdfEmmbeded .pdf
Emmbeded .pdfLeviIuo
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...IJCNCJournal
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsVijay Karan
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsVijay Karan
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET Journal
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsVijay Karan
 
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...IJECEIAES
 
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...IAEME Publication
 
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...IJAAS Team
 
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANijtsrd
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...TELKOMNIKA JOURNAL
 

Semelhante a W4301117121 (20)

Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice based
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
 
Jf3416691674
Jf3416691674Jf3416691674
Jf3416691674
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Emmbeded .pdf
Emmbeded .pdfEmmbeded .pdf
Emmbeded .pdf
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
 
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
 
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
 
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
 
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLAN
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...
 
F04503057062
F04503057062F04503057062
F04503057062
 

Último

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Último (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

W4301117121

  • 1. Mr.P.Kanagaraju et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.117-121 www.ijera.com 117 | P a g e Secure Cluster Based Routing Using SAT/ILP Techniques and ECC EL-Gamal Threshold Cryptography in MANET Mr. P. Kanagaraju. Me, (Ph. D)*, Dr. R. Nallusamy Ph.D.**, Nandini. D. K*** *Department of Computer Science, K.S.Rangasamy college of Technology, Thiruchengode ** Professor ***Department of Computer Science, K.S.Rangasamy college of Technology, Thiruchengode. ABSTRACT The Elliptic curve cryptography ( ECC) a promising and important because it requires less computing power, bandwidth, and also the memory when comparing to other cryptosystems The clustering algorithm using the Integer Linear Programming (ILP) and Boolean Satisfiability (SAT) solvers. These improvements will secure the application of SAT and ILP techniques in modeling composite engineering problem that is the Clustering Problem in Mobile Ad-Hoc Networks (MANETs). The Clustering Problem in MANETs consists of selecting the most appropriate nodes of a given MANET topology as clusterheads, and ensuring that regular nodes are related to clusterheads such that the lifetime of the network is maximized. In which, discussing SAT/ILP techniques for clustering techniques and ECC El Gamal Threshold Cryptography for the security. Through our implementation, explored the possibility of using ECCEG-TC in MANETs. Keywords - Boolean Satisfiability, Elliptic curve cryptography, ECC El Gamal Threshold Cryptography Integer Linear Programming. I. INTRODUCTION Mobile ad hoc networks (MANETs) are vulnerable to various attacks including denial-of- service attacks because of wireless nature of these networks. Devices with constraint resources add to its vulnerability. To ensure availability of nodes, threshold cryptography can be implemented in these networks so that even if some of the information is lost still the actual message reaches the intended receiver without compromising security in terms of secrecy, reliability, and genuineness. Elliptic Curve Cryptography (ECC) was first proposed by victor Miller and independently by Neal Koblitz in the mid-1980s and has evolved into a mature public-key cryptosystem. Distinguish to its conventional counterparts, ECC offers the same level of security using security. Threshold cryptography achieves the security needs such as confidentiality and integrity against malicious nodes. It also provides data integrity and availability in a hostile environment and can also employ verification of the correct data sharing. All this is achieved without revealing the secret key. Thus, taking into consideration these characteristics, implementing TC to secure messages seems a perfect solution in MANETs. For the past few decades, Integer Linear Programming (ILP) and Boolean Satisfiability (SAT) solvers have enhanced a lot through the beginning of new intelligent algorithms that allowed the solvers to handle a wider range of difficult Engineering based problems. Mainly one of such problem is clustering in Mobile Ad-Hoc Networks (MANETs). Cryptography is transforming a information it into an unreadable format in which a message can be concealed from reader and only the intended recipient will be able to convert it into original text. Its main goal is to keep the data secure from unauthorized access. Data can be read and understood without any special measures are known as plaintext. Hiding information into the plaintext is called encryption. Encrypted plaintext information into an unreadable garbage known as cipher-text. Reverting process of cipher text to its original plaintext is called decryption. A system provides encryption and decryption is called cryptosystems. Cryptography provides number of security goals to ensure the privacy of data, on-alteration of data and so on. Types of various goals of cryptography are below Confidentiality Maintaining a secret communication between the two authorized persons. Authentication Checking the identity of the information from the legitimate or authentication ID. Data Integrity Verifying the information that has not been altered by unauthorized which means no one in between the sender and receiver are allowed to alter RESEARCH ARTICLE OPEN ACCESS
  • 2. Mr.P.Kanagaraju et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.117-121 www.ijera.com 118 | P a g e the given message. Non Repudiation Thus when a message is sent, the receiver can prove that the message was in fact send by the suspected sender. Correspondingly, when a message is received, the sender can prove the suspected receiver in fact received the message. Access Control Only the certified parties are able to right to use the given information . II. Integer Linear Programming And Boolean Satisfiability Integer Linear Programming (ILP) involves maximizing or minimizing a function with respect to certain constraints where the optimal function and constraints are linear and the used variables can only take integer values [2]. Cases where the integer values are restricted to (0–1) are called Binary ILP Problems. In SAT the constraints between variables are represented using what is called propositional logic. It involves the use of AND, OR and NOT operations to construct formulas in the Products-of- Sums form or Conjunctive Normal Form (CNF). The variables can only take Binary values (0–1). Given constraints articulated in CNF, the ambition is to spot a variable obligation that will satisfy all constraints in the problem or verify that no such task exists. To assure or to solve, SAT will go all the way through the hunt space and conclude whether or not there is a fulfilling variable assignment. Superior decision heuristics and clever inconsistency analysis techniques can be used to evade probing through the complete tree of 2n assignments. It proposes an ILP formulation of the clustering problem, structure on the ideas and assumptions put forward in the EEC-CB model presented in this model improves on weaknesses present in the EEC-CB model and adds idleness through the use of a Star-Ring backbone. In addition, a proposed enhancement allows coverage to be taken into account. Proposed Base Model Variables are maintained below as: − N: Total number of nodes in the network (predetermined) − P: Number of clusters heads (predetermined) − di j : Euclidean distance between nodes i and j − K : Max number of nodes that can be connected to a CH (predetermined) − ci j : Cost of connecting a regular node i to CH j (proportional to di 2 j) − h j k : Cost of connecting CH j to CH k (proportional to d3 jk ) The assumptions which were made above in the ILP formulations are also valid to the proposed ILP formulation. Variable b, in the intention role, which represents the level of the node’s capability to act as a cluster head, gets its value from an external source (algorithm, tool, etc). This is useful as multiple approaches or algorithms, which decide the suitability of a node in acting as a cluster head, can be combined with this model without altering the equations, even though this is out of the range of research. Then it is unspecified that nodes are able to resolve each other’s spot. Fig. 1 Star-ring backbone. Intra Cluster Communication Enhancement Intra Cluster communication is introduced for two issues. First is that the most important accountability of the cluster head should be to route communication among clusters and not inside a cluster. The aim is for the cluster head to preserve as much energy as achievable for the contact between clusters, allowing it to last longer in its position as a cluster head. The second cause after enhancing the intra cluster contact is that should a cluster head fail, the nodes inside a cluster will be able to communicate. Multihop Connections Enhancement Multihop connections are introduced into the formulation to permit longer, extra exclusive links to be replaced by shorter less costly links. relatively than attach straight to a cluster head which is further away, it is preferable to make a lesser cost link to a cluster head during another regular node. Though, the in-between regular node will now, in a sense, act like a second tier cluster head as it will route the communication of the regular node through it to the cluster head. Price of this routing must be taken into explanation. After that objective function is used to integrate the cost of multihop connections to the proposed Star-Ring base model. Coverage Enhancement The proposed Base Model can be extended to take into account the coverage radius of the nodes
  • 3. Mr.P.Kanagaraju et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.117-121 www.ijera.com 119 | P a g e in the system, and make sure that links are recognized only between nodes that are within each other’s exposure radius. Likewise the same manner in which the distances between nodes are used to determine the price of the links, it can also be compared to the exposure radius of each node and used to Sample MANET topology. III. Ecc Elgamal Tc (Ecceg-Tc) The ELGamal public-key encryption scheme can be viewed as Diffie-Hellman key agreement protocol in key transmit mode. Its protection is based on the intractability of the discrete Logarithm Problem (DLP) and the Diffie-Hell man problem. EC-ELGamal protocol implemented for safe communication. One essential tip is to note is unlike ECDH protocol, this protocol does not create common key, but using EC-ELGamal protocol a message M=(M1,M2),a point on elliptic curve, can be sent from Bank to Alice and vice versa. Performing the decrypting, reverse the embedding process to create the message M starting to the point P. It is not trivial to find a point M for the communication. Communication that is difficulty in obtaining the private key from the public key is based on the discrete log problem (DLP) for elliptic curves. The ELGamal digital signature scheme: The ELGamal signature algorithm is similar to the encryption algorithm in that the public key and private key have the same form; however, encryption is not the same as signature verification, nor is decryption the same as signature creation as RSA. In following sections, our goal is to implement ECC based ElGamal threshold cryptography (ECCEG- TC). In this algorithm, key is not shared because the public as well as private keys are in form of points and we cannot apply Lagrange on the points altogether to split message or to combine it. Hence, ECCEG-TC for message splitting before encryption is simulated for MANET environment and then it is compared with performance of RSA-TC. The ECC El Gamal Threshold cryptography (ECCEG-TC) algorithm is briefly explained. ECCEG-TC Message Split before Encryption Algorithm Suppose that the ECC has a point G on an elliptic curve E p (a, b), and the order of G is q. p is a large prime. Bob’s private key and public key are n B , 0 < n B < q, and K B = n B G. • First we choose a prime number p > max(M, n), and define a 0 = M, the message. Then we select k - 1 random, independent coefficients a 1 , a 2 ,…a k - 1 , 0 ≤ a j ≤ p-1, defining the random polynomial f(x) over Zp, a Galois prime field GF(p). • We compute n shares, M i = f(x i ) mod p, 1≤ i ≤ n, where x i can be just the public index i for simplicity, and convert them to points P i on elliptic curve E p (a, b). • Alice picks a random number r, and sends rG and P i + rK B to Bob with index t. • Bob recovers each elliptic curve point by calculating P i + rK B – n B rG = P i . • Bob converts P i to M i , and deduces M by using Lagrange interpolation formula M. ECCEG-TC Implementation ECCEG-TC,to select the ECC parameters, i.e. a, b, p, widely accepted NIST curves were selected for implementation for 192, 224, and 256 bits. For conversion of message to and from ECC point, method discussed by Kobiltz is used such that (kappa*M)mod p < x <(kappa*(M+1))mod p, where (x, y) is a point on elliptic curve. In our ECCEG-TC implementation, kappa is fixed to 2 8 . To retrieve a message from a ECC point (x, y), M= x/kappa mod p is used. For calculating the shares and for combining partial messages, Shamir’s Lagrange interpolation scheme is implemented. For its polynomial, the coefficients are randomly generated over the modulus p. The co-efficient zero depends on the x and y values of ECC point information that needs to be transmitted based on ECC algorithm used. As against RSA algorithm where we are sharing the keys, in ECC-TC implementation, the partial shares of the message are generated and then encrypted to get ECC point. Cryptography is transforming a information it into an unreadable format in which a message can be concealed from reader and only the intended recipient will be able to convert it into original text. Its main goal is to keep the data secure from unauthorized access. IV. Performance Results Performance Results Fig. 2 Topology generated by the ILP formulation without coverage constraints.
  • 4. Mr.P.Kanagaraju et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.117-121 www.ijera.com 120 | P a g e Fig. 3 Topology generated by the ILP formulation with coverage constraints. Fig.4 illustrates that with increase in ECC key size, the total encryption timings increase gradually for given n and t. For constant key size and n, the encryption timings increase with t as the time to generated Lagrange polynomial and respective message shares increases accordingly. Fig. 4 Total Encryption Timings for ECCEG-TC Fig. 5 shows that the share generation timings increase with increase in key size or with n or t. Share generation timings are very small compared to the encryption timings. Fig. 5 Share Generation Timings for ECCEG-TC Combination time is the time required to combine t partial messages using Shamir’s Lagrange interpolation method to retrieve original message. From Fig. 6, the total decryption and combination timings increase gradually with increase in t for constant key size and n. This increase is due to time required to decrypt and combine additional partial messages as t is increased. Increase in the key size results in proportional increase in the decryption timings irrespective of n and t. Fig. 6 Decryption and Combination Timings for ECCEG-TC Number of point addition of ECCEG-TC increases with n resulting into proportionate increase in addition timing in encryption and decryption as seen in Fig. 4 and Fig. 6. The time required converting message to point and vice-versa is significantly small compared to encryption and share generation time and hence not shown separately. In ECCEG-TC, the Lagrange is carried over prime field p, hence the success rate is 100% as all the partial messages are recovered without any issue of inverse calculation. V. Conclusion An improved ILP formulation to solve the clustering trouble in MANETs. The future model offered the utilize of a Star-Ring backbone. In addition, the planned formulation incorporated the ability to enforce coverage constraints to ensure that only connections that are within the physical limitations of the node are established. Applications of MANETs are on rise and hence it is necessary to provide security to this vulnerable wireless networks. And by further exploring and implementing ECC ELgamal threshold cryptography algorithms, its shown that secure MANETs are feasible. References [1] S. Chinara and S. Rath, “Energy efficient mobility adaptive distributed clustering algorithm for mobile ad hoc network,” in Proc. Int. Conf. Adv. Comput. Commun., 2008, pp. 265–272. [2] A. Schrijver, Theory of Linear and Integer Programming.New York, NY, USA: Wiley, 1999. [3] F. Aloul, A. Ramani, I. Markov, and K. Sakallah, “Generic ILP versus specialized 0- 1 ILP: An update,” in Proc. Int. Conf. Comput.-Aided Design, 2002, pp. 450–457. [4] D. Chai and A. Kuehlmann, “A fast pseudo-
  • 5. Mr.P.Kanagaraju et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.117-121 www.ijera.com 121 | P a g e [5] Boolean constraint solver,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 24, no. 3, pp.305–317, Mar. 2005. [6] A. Sagahyroon, F. Aloul, and A. Sudnitson, “Using SAT-based tech-niques in low power state assignment,” J. Circuits, Syst., Comput, vol. 20, no. 8, pp. 1605–1618, 2011. [7] Yufang Huang, “Algorihtm for elliptic curve diffie-Hellman key exchange based on DNA title self assembly In Proceedings of 46th IEEE Theories and Applications,pp.31-36, 2008. [8] A. M. Fiskiran and R. B. Lee. “Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments”. IEEE International Workshop on WWC-5, 2009. [9] K. Lauter, “The advantages of Elliptic Curve Cryptography For Wireless Security”, IEEE Wireless Communications, vol. 11, no. 1, Feb. 2004, pp. 62-67. [10] Y. Desmedt and Y. Frankel, “Threshold cryptosystems”, in Advances in Cryptology - Crypto '89, Proceedings, Lecture Notes in Computer Science 435, G. Brassard, Ed., Santa Barbara: Springer-Verlag,1990, pp. 307-315.