DOIONLINE

DOIONLINE NO - IJAECS-IRAJ-DOIONLINE-7713

Publish In
International Journal of Advances in Electronics and Computer Science-IJAECS
Journal Home
Volume Issue
Issue
Volume-4,Issue-4  ( Apr, 2017 )
Paper Title
A Secure Scheme for Identifying and Verifying Origin Forgery in Wan Networks
Author Name
Shaik.Jameer Khasim, Bodapati Nagaeswari
Affilition
M-Tech Research Scholar, Assistant Professor, Department of Computer Science and Engineering, GVR&S College of Engineering and Technology, Guntur, Andhra Pradesh
Pages
152-155
Abstract
In this paper, we describe our early implementation and testing of an in-packet Bloom filters forwarding node that implements cryptographically computed link identifiers. We have tested two different cryptographic techniques for the linkidentity computation and thereby for making the forwarding decision. In-packet Bloom filters allow only one to forward source-routed packets with minimal forwarding tables. The Bloom filter encoding the identities of the links the packet need to be forwarded over. As sensor networks are being increasingly deployed in the decision-making infrastructures such as battlefield monitoring systems, SCADA making decision makers aware of the trustworthiness of the collected data is a crucial.In short paper describes how to preserve integrity and confidentiality of a directed acyclic graph model of provenance database. Keywords- Sensor network, Security, Provenance, Bloom, Filtering
  View Paper