Open Access
Subscription Access
Open Access
Subscription Access
An Entropy Encoding Method for Routing Metadata in Ad HOC Network
Subscribe/Renew Journal
Secret common transmission among two or multiple nodes in a network resides at the ischolar_main of common communication security. In the existing system DSR (Dynamic Source Routing) algorithm is used when a user (sender) decides to send a packet to a destination node (receiver) in the Ad hoc network. Key wrapped technique is used to encode the ip address, path and data because the third party hacker cannot hack the information from the node and also maximum entropy is occurred. The aim of this research work is to reduce the entropy process in data transmission by identifying active nodes through which file/data are to be transmitted. The proposed method uses the selective reference algorithm to identify active nodes and the key wrapped technique to encode the ip address of the selected nodes and find it path/route to transfer the file/data. This proposed work reduces the entropy process and router path is more secure and provide high performance of ad hoc network during transmission.
Keywords
Encoding, Entropy, Metadata, Routing.
Subscription
Login to verify subscription
User
Font Size
Information
- W. Diffie, and M. E. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
- S. K. Park, and K. W. Miller, “True random number generators for cryptography,” in Cryptographic Engineering. New York, NY, USA: Springer, pp. 55-73, 2009.
- Y. Shah, W. Trappe, and N. Mandayam “Information-theoretically secret key generation for fading wireless channels,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 240-254, Jun. 2010.
- M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
- Y. Zhang, A. Juels, and M. K. Reiter, “Cross-VM side channels and their use to extract private keys,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
- https://fcit.usf.edu/network/chap1/chap1.htm
- https://en.wikipedia.org/wiki/ Network_security
- https://www.techopedia.com/definition/5868/ad-hoc-network
- https://en.wikipedia.org/wiki/Metadata
- https://en.wikipedia.org/wiki/ Router_(computing)
Abstract Views: 354
PDF Views: 3