2.Conference Paper (10)
Permanent URI for this collectionhttps://dspace.psgrkcw.com/handle/123456789/4215
Browse
3 results
Search Results
Item SECURING DATA TRANSMISSION IN MANET USING AN IMPROVED COOPERATIVE BAIT DETECTION APPROACH(IEEE Xplore, 2017-03-30) Nachammai, M; Radha, NMobile Ad hoc Network often called as MANET, which does not have any particular infrastructure, in which each mobile devices are connected wirelessly and can move freely in any direction without having any restrictions in the network. Malicious nodes present in this network can easily launch highly vulnerable attacks like collaborative Black hole attack and Gray hole attack due to its dynamically changing topology. These attacks affect the routing process within MANET. Hence, Security is the primary concern for finding these nodes. But, to prevent or detect malicious nodes that causes Gray hole or a collaborative black hole attack is a challenge. In this scheme, the malicious nodes and its behaviours are detected using reverse tracing technique by sending RREQ and RREP. However security for transmitting data is not considered by CBDS. In order to have secure transmission after the malicious node detection, our proposed system uses an improved Cooperative Bait Detection approach which incorporates CBDS with message security schemes. Finally this approach is compared with the existing system by using performance metrics like End-to-End Delay, Packet Delivery Ratio (PDR), Throughput and Routing Overhead.Item SECURING PATIENT'S CONFIDIENTIAL INFORMATION USING ECG STEGANOGRAPHY(IEEE, 2017-10) Sivaranjani, B; Radha, NThe main goal of this research work is to enhance the security of Patient's medical data. During the transmission, the data is concealed with ECG signal. The ECG signal of the human being vary from one person to person. Like other Biometric traits, ECG cannot be imitated and duplicated. Encryption is one of the best technique that guarantees the security of sensitive information. This technique not only grants the information's security but also authentication. secret sub keeping system security. digital signature, and etc. Therefore, the purpose of adopting encryption techniques is to ensure the information's integrity and confidentiality, that prevents information from tampering, forgery and counterfeiting. The encryption method used in this work will encrypt the secret data into unreadable form by creating the information inaccessible to any hacker having a random method. In this paper, Haar Wavelet Transformation is used to decompose an ECG signal to different frequency sub-bands. RSA algorithm is used to encrypt the patient information with the help of key pairs. Arnold cat map technique is used to scramble the encrypted data for more security of information. And for embedding, Singular Value Decomposition (SVD) is used for effective transformation with high security. The proposed algorithm is evaluated based on MSE, PSNR, AD, NCC, MD, NAE, BER and accuracy. The experimental results prove that the performance obtained using proposed techniques give better results than the existing techniques.Item SECURE AND ATTACK AWARE ROUTING IN MOBILE AD HOC NETWORKS AGAINST WORMHOLE AND SINKHOLE ATTACKS(IEEE, 2017-10) Sasirekha, D; Radha, NThe inherent characteristics of Mobile Ad hoc network (MANET) such as dynamic topology, limited bandwidth, limited power supply, infrastructure less network make themselves attractive for a wide spectrum of applications and vulnerable to security attacks. Sinkhole attack is the most disruptive routing layer attack. Sinkhole nodes attract all the traffic towards them to setup further active attacks such as Black hole, Gray hole and wormhole attacks. Sinkhole nodes need to be isolated from the MANET as early as possible. In this paper, an effective mechanism is proposed to prevent and detect sinkhole and wormhole attacks in MANET. The proposed work detects and punishes the attacker nodes using different techniques such as node collusion technique, which classifies a node as an attacker node only with the agreement with the neighboring nodes. When the node suspects the existence of attacker or sinkhole node in the path, it joins together with neighboring nodes to determine the sinkhole node. In the prevention of routing attacks, the proposed system introduces a route reserve method; new routes learnt are updated in the routing table of the node only after ensuring that the route does not contain the attacker nodes. The proposed system effectively modifies Ad hoc on demand Distance Vector (AODV) with the ability to detect and prevent the sinkhole and wormhole attack, so the modified protocol is named as Attack Aware Alert (A3AODV). The experiments are carried out in NS2 simulator, and the result shows the efficiency in terms of packet delivery ratio and routing overhead.