International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 02 | Feb -2017
e-ISSN: 2395 -0056
www.irjet.net
p-ISSN: 2395-0072
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wireless Mobile Network Ammu.R 1, Harini.M 2, Sumedha.K.R 3 ,Venkata Lakshmi.S4 4S.Venkata
Lakshmi, Professor, Dept. of Computer Science & Engineering, Panimalar Institute Of Technology, Chennai, Tamilnadu, India
----------------------------------------------------------------------------------****--------------------------------------------------------------------------ABSTRACT: Batch cryptography technique is a powerful tool to reduce verification time. There will be two directions to apply the batch cryptography concept in WMNs: Batch verification and Batch identification. It is unrealistic to completely prevent all adversaries (attackers) from generating false messages with invalid signatures. Thus, to guarantee the performance of batch verification, we should identify invalid signatures in a batch rapidly. Batch identification is a technique to find the bad signatures within a batch when the batch verification fails. Due to the inefficiency of individual identification, divide and conquer techniques have been proposed to improve the performance of batch identification. Keywords: Condensed Binary Identification(CBI), Multiple Rounds
Identification(MRI),
Attackers,
AutomatchProtocol, Sink.
Mobile Computing is an infrastructure wireless network that requires the use of an infrastructure device, such as an access point or a base station. It is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. A Cellular Network or Wireless Mobile Network is a communication network where the last link is wireless. The network is distributed over land areas called cells, each served by at least one fixed-location transceiver, known as cellsite or base station. A network
|
Impact Factor value: 5.181
Signature verification at sink using batch verification
Attacker Node Identification Identifies attackers low Performance Multiple Rounds Identification high History Updated
Fig.1.1.Overall Architecture Diagram Consists of both normal nodes and some of the attackers. Attacker’s strategy can be changed at any time from low to high or vice-versa. They corrupt some of the messages (packets) in a transaction. It may be low or high level based on the attacker. Digital signature is a widely used technique to protect messages’ authenticity and nodes’ identities. However, most of the existing works focus on designing batch verification algorithms for wireless mobile networks without sufficiently considering the impact of invalid signatures, which can lead to verification failures and performance degradation.
1. INTRODUCTION
© 2017, IRJET
Node Formation
Condensed Binary Identification
|
ISO 9001:2008 Certified Journal
|
Page 1936