A wireless sensor network (WSNs) is ubiquitous and gets a lot of interest from researchers towards the best applications. Wormhole nodes are false routes that are shorter than the original route in the network it creates problem in routing mechanism, which rely on the facts about distance between nodes. The attacker node captures the packets from the legitimate nodes. In our proposed research work we identify the wormhole node by their high power transmission in the network and also put off the network from the wormhole by achieving confidentiality in our modified AODV.
Data security is an important issue in data transmission through any type of network whether it is LAN, WAN, MAN or PAN. We are concentrating on PAN that is personal area network. Bluetooth is an example of this type of network. To provide the security in Bluetooth communication currently used encryption algorithm is a 128 bit symmetric stream cipher but symmetric cipher may be broken under certain condition. Another popularly used encryption algorithm for Bluetooth security are Data Encryption Standard (DES) and Ron Rivest, Adi Shamir and leonard adleman (RSA) Algorithm. However DES is vulnerable to possible attacks. To overcome these limitations and increase the security in Bluetooth communication here we propose an integrated cryptographic scheme. This scheme is based on Triple DES, RSA and MD5.Triple DES algorithm (variant of DES) is used for encryption, which is more secure in comparison to DES. RSA is used to encrypt the key of triple DES. Message digest Algorithm MD5 is adopted in this mechanism to verify the integrity of the message. Three major security principles such as authentication, confidentiality and integrity are achieved together using this scheme.
Authentication and cryptosystems are two examples of methods for ensuring user identification and data confidentiality. Because of its one-way nature, hashing is used to verify the identity and accuracy of data travelling across an open medium. It detects unlawful modifications and changes made to transmissions. Digital signature, which deals with document uniqueness and creator oneness, are a well-known application of hashing. It is updated by adding more information about the users' attributes and is classified as an attribute-based signature (ABS). We investigated various past approaches to the ABS phenomena and discovered certain unsolved challenges, resulting in a solution that decreases the difficulty level, utilization, and operating expense coupled with signature creation and confirmation. For focusing the method of digital signatures using elements and their first order logic, we suggested a unique Attribute Based Signature Architecture for Transferring Digital Document. The system includes flexible primitives that give signing parties complete control over signature generation as well as policy-based access security constraints. It has a message-based first order logic and protects the secrecy of signatures. After examining the technique logically, various benefits were discovered, which will be confirmed soon by the implementation solution over the recommended framework under the specified key.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.