Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Analysis of Reliable Secure Transmission for Unobservable Secure Table Driven Protocol


Affiliations
1 National Engineering College, Kovilpatti-628503, Tamilnadu, India
2 Dr. Nagarathinam's College of Engineering, Namakkal, Tamilnadu, India
     

   Subscribe/Renew Journal


USOR solves the problem of unlinkability, unobservability and anonymity by combining group signature and ID-based encryption for route discovery. Apart from the security, there is another requirement in transmission is effective and efficient delivery of data. USOR uses ordinary distance calculations to get the knowledge about neighbour nodes. At the same time we can’t incorporate the entire information about the network into single node or every node. We know that nodes in ad-hoc network have limited storage and battery power. Already half of the power vested in security, remaining power has to be used for calculating routes and data transmission. For that we are merging the above USOR with Better Approach To Mobile Ad-hoc Networking, or B.A.T.M.A.N[12]. which is a routing protocol that uses the decentralization of the knowledge about the best route through the network — no single node has all the data. This technique eliminates the need to spread information concerning network changes to every node in the network. The individual node only saves information about the ―direction‖ it received data from and sends its data accordingly. From this we are achieving fast transmission of data in a secure way with minimum node failure rate.USOR schemes delivery packet ratio has been an enormous session management system in networking communications.

Keywords

USOR, ID-Based Encryption, B. A. T. M. A. N.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 247

PDF Views: 3




  • Analysis of Reliable Secure Transmission for Unobservable Secure Table Driven Protocol

Abstract Views: 247  |  PDF Views: 3

Authors

S. Vimal
National Engineering College, Kovilpatti-628503, Tamilnadu, India
R. Laxminarayanan
Dr. Nagarathinam's College of Engineering, Namakkal, Tamilnadu, India
V. Jackins
National Engineering College, Kovilpatti-628503, Tamilnadu, India
L. Jerartjulus
National Engineering College, Kovilpatti-628503, Tamilnadu, India

Abstract


USOR solves the problem of unlinkability, unobservability and anonymity by combining group signature and ID-based encryption for route discovery. Apart from the security, there is another requirement in transmission is effective and efficient delivery of data. USOR uses ordinary distance calculations to get the knowledge about neighbour nodes. At the same time we can’t incorporate the entire information about the network into single node or every node. We know that nodes in ad-hoc network have limited storage and battery power. Already half of the power vested in security, remaining power has to be used for calculating routes and data transmission. For that we are merging the above USOR with Better Approach To Mobile Ad-hoc Networking, or B.A.T.M.A.N[12]. which is a routing protocol that uses the decentralization of the knowledge about the best route through the network — no single node has all the data. This technique eliminates the need to spread information concerning network changes to every node in the network. The individual node only saves information about the ―direction‖ it received data from and sends its data accordingly. From this we are achieving fast transmission of data in a secure way with minimum node failure rate.USOR schemes delivery packet ratio has been an enormous session management system in networking communications.

Keywords


USOR, ID-Based Encryption, B. A. T. M. A. N.