Erroneous message discovery with data acquisition and secret communication in cellular networks
-
2018-05-29 https://doi.org/10.14419/ijet.v7i2.31.13437 -
Cellular networks, sensitivity knots, cipher, data acquisition, encipher, decipher, data exposure. -
Abstract
Cellular networks are susceptible to different varieties of security barrages, inclusive of erroneous message inoculation, message falsification and monitoring. Sensitivity knots can be adjudicate by invaders and the adjudicate knots can misinterpret message integrity by inoculating erroneous message. Erroneous message can be inoculated by adjudicate sensitivity knots in different measures, Inclusive of data acquisition and broadcasting. In a System the erroneous message exposure methods contemplate the erroneous message inoculations during the message promoting only. In an (SEP) symmetric en-route purifying schemes facilitates broadcasting knots and central terminal will expose erroneous message with a assertive possibility. In an interlaced step-by-step validation pattern Sensitivity knots are not granted to execute the data acquisition during message promoting. The Capricious Cipher based En-route purifying scheme (CCEP) nips erroneous message en-route without balanced key distribution. Message confidentiality means message to be enciphered at the origin knot and deciphered at the terminal. However, message acquisition methods usually need any enciphered sensitivity message to be deciphered at data acquisition. The essential idea at the rear of the erroneous message exposure algorithm is to make team of sensitivity knots in which one team operates a message authentication code (MAC) of promoting message and the alternate team afterwards checks the message using the MAC. Data acquisition is equipped in cellular sensitivity network in order to remove message repetition, minimize message communication, and increase message efficiency.
Â
Â
-
References
[1] Nii E, Kitanouma T, Adachi N & Takizawa Y, “Cooperative detection for falsification and isolation of malicious nodes for wireless sensor networks in open environmentâ€, IEEE Asia Pacific Microwave Conference (APMC), 2017, pp.521-524.
[2] Jose J, Jose J & Muhammed Ilyas H, “Symmetric concealed data aggregation techniques in wireless sensor networks using Privacy Homomorphism: A reviewâ€, International Conference on Information Science (ICIS), (2016), pp.275-280.
[3] Dobslaw F, Gidlund M & Zhang T, “Challenges for the use of data aggregation in industrial Wireless Sensor Networksâ€, IEEE International Conference on Automation Science and Engineering (CASE), (2015), pp.138-144.
[4] Bharuka K & Jinwala DC, “A secure data aggregation protocol for outlier detection in wireless sensor networks using aggregate Message Authentication Codeâ€, 9th International Conference on Industrial and Information Systems (ICIIS), (2014), pp.1-6.
[5] Ozdemir S & Çam H, “Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networksâ€, IEEE/ACM Transactions on Networking, Vol.18, No.3, (2010).
[6] Akyildiz F, Su W, Sankarasubramaniam Y & Cayirci E, “A Survey on sensor networksâ€, IEEE Commun. Mag., Vol.40, No.8, (2002), pp.102–114.
[7] Ye F, Luo H, Lu S & Zhang L, “Statistical en-route detection and filtering of injected false data in sensor networksâ€, Proc. IEEE INFOCOM, Vol.4, (2004), pp.2446–2457.
[8] Zhu S, Setia S, Jajodia S & Ning P, “Interleaved hop-by-hop authentication against false data injection attacks in sensor networksâ€, ACM Trans. Sensor Netw., Vol.3, No.3, (2007).
[9] Yang H & Lu S, “Commutative cipher based en-route filtering in wireless sensor networksâ€, Proc. IEEE VTC, (2004),pp.1223–1227.
[10] Yu Z & Guan Y, “A dynamic en-route scheme for filtering false data in wireless sensor networksâ€, Proc. IEEE INFOCOM, Barcelona, Spain, (2006), pp.1–12.
[11] Intanagonwiwat C, Estrin D, Govindan R & Heidemann J, “Impact of network density on data aggregation in wireless sensor networksâ€, Proc. 22nd Int. Conf. Distrib. Comput. Syst., (2002), pp.575–578.
[12] Perrig A, Szewczyk R, Tygar JD, Wen V & Culler DE, “SPINS: Security protocols for sensor networksâ€, Wireless networks, Vol.8, No.5, (2002), pp.521-534.
-
Downloads
-
How to Cite
Balakrishna, R., Anandan, R., & Sajeev Ram, A. (2018). Erroneous message discovery with data acquisition and secret communication in cellular networks. International Journal of Engineering & Technology, 7(2.31), 186-189. https://doi.org/10.14419/ijet.v7i2.31.13437Received date: 2018-05-29
Accepted date: 2018-05-29
Published date: 2018-05-29