Paper Title
A Secure Scheme for Identifying and Verifying Origin Forgery in Wan Networks
Abstract
In this paper, we describe our early implementation and testing of an in-packet Bloom filters forwarding node that
implements cryptographically computed link identifiers. We have tested two different cryptographic techniques for the linkidentity
computation and thereby for making the forwarding decision. In-packet Bloom filters allow only one to forward
source-routed packets with minimal forwarding tables. The Bloom filter encoding the identities of the links the packet need
to be forwarded over. As sensor networks are being increasingly deployed in the decision-making infrastructures such as
battlefield monitoring systems, SCADA making decision makers aware of the trustworthiness of the collected data is a
crucial.In short paper describes how to preserve integrity and confidentiality of a directed acyclic graph model of provenance
database.
Keywords- Sensor network, Security, Provenance, Bloom, Filtering
Author - Shaik.Jameer Khasim, Bodapati Nagaeswari
Published : Volume-4,Issue-4 ( Apr, 2017 )
DOIONLINE Number - IJAECS-IRAJ-DOIONLINE-7713
View Here
|
|
| |
|
PDF |
| |
Viewed - 44 |
| |
Published on 2017-06-23 |
|
|
|
|
|
|