Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wireless Mobile Network

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 02 | Feb -2017

e-ISSN: 2395 -0056

www.irjet.net

p-ISSN: 2395-0072

Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wireless Mobile Network Ammu.R 1, Harini.M 2, Sumedha.K.R 3 ,Venkata Lakshmi.S4 4S.Venkata

Lakshmi, Professor, Dept. of Computer Science & Engineering, Panimalar Institute Of Technology, Chennai, Tamilnadu, India

----------------------------------------------------------------------------------****--------------------------------------------------------------------------ABSTRACT: Batch cryptography technique is a powerful tool to reduce verification time. There will be two directions to apply the batch cryptography concept in WMNs: Batch verification and Batch identification. It is unrealistic to completely prevent all adversaries (attackers) from generating false messages with invalid signatures. Thus, to guarantee the performance of batch verification, we should identify invalid signatures in a batch rapidly. Batch identification is a technique to find the bad signatures within a batch when the batch verification fails. Due to the inefficiency of individual identification, divide and conquer techniques have been proposed to improve the performance of batch identification. Keywords: Condensed Binary Identification(CBI), Multiple Rounds

Identification(MRI),

Attackers,

AutomatchProtocol, Sink.

Mobile Computing is an infrastructure wireless network that requires the use of an infrastructure device, such as an access point or a base station. It is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. A Cellular Network or Wireless Mobile Network is a communication network where the last link is wireless. The network is distributed over land areas called cells, each served by at least one fixed-location transceiver, known as cellsite or base station. A network

|

Impact Factor value: 5.181

Signature verification at sink using batch verification

Attacker Node Identification Identifies attackers low Performance Multiple Rounds Identification high History Updated

Fig.1.1.Overall Architecture Diagram Consists of both normal nodes and some of the attackers. Attacker’s strategy can be changed at any time from low to high or vice-versa. They corrupt some of the messages (packets) in a transaction. It may be low or high level based on the attacker. Digital signature is a widely used technique to protect messages’ authenticity and nodes’ identities. However, most of the existing works focus on designing batch verification algorithms for wireless mobile networks without sufficiently considering the impact of invalid signatures, which can lead to verification failures and performance degradation.

1. INTRODUCTION

© 2017, IRJET

Node Formation

Condensed Binary Identification

|

ISO 9001:2008 Certified Journal

|

Page 1936


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.