Skip to main content

An Approach to Identify Data Leakage in Secure Communication

  • Conference paper
  • First Online:
Proceedings of 2nd International Conference on Intelligent Computing and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 467))

Abstract

In the field of wireless networks, Mobile Ad hoc Network (MANET) is one of the most unique applications due to mobility and scalability. As it is vulnerable to malicious attackers with the open medium and wide distribution, network performance is degraded with the behavior attacks in MANET’s, which makes protection most important. In any ad hoc networks, one of the situations is that, when a data distributor possesses sensitive data destined to a set of supposedly trusted parties, some data can be leaked at an authorized place. With the introduction of fake objects the data allocation strategies gives a path in identifying leakages ensuring more security with encryption. In this context, light weight system is proposed to characterize the data loss and to minimize the performance degradation in such networks. The light weight system includes the concept of cryptography and routing protocol implementation at different stages of data transfer. A social network is taken as a challenging issue to achieve the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Royer, E.M., Toh, C.K.: A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Pers. Commun. (1999)

    Google Scholar 

  2. Renu, B., Mandoria H.L., Pranavi, T.: Routing Protocols in Mobile Ad-Hoc Network: A Review, pp. 52–60. Springer, LNCS (2013)

    Google Scholar 

  3. Vulimiri, A., Gupta, A., Roy, P., Muthaiah, S.N., Kherani, A.A.: Application of secondary information for misbehavior detection in VANETs. In: IFIP, vol. 6091, pp. 385–396. Springer, LNCS, Berlin (2010)

    Google Scholar 

  4. Cayrichi, E., Rong, C.: Security in Wireless Ad Hoc and Sensor Networks. Wiley, New York (2009)

    Google Scholar 

  5. Papadimitriou, P., Garcia-Molina, H.: Data leakage detection. IEEE Trans. Knowl. Data Eng 23, 51–63 (2011)

    Article  Google Scholar 

  6. Czerwinski, S., Fromm, R., Hodes, T.: Digital Music Distribution and Audio Watermarking. UCB IS 219, Technical report (2010)

    Google Scholar 

  7. Singh, A.: Identifying malicious code through reverse engineering. In: Advances in Information Security, p. 115. Springer, Berlin (2009)

    Google Scholar 

  8. Lu, S., Li, J., Liu, Z., Cui, G.: A secure data transmission protocol for mobile ad hoc networks. In: Chapter Intelligence and Security Informatics, vol. 4430, pp. 184–195. Springer, LNCS (2007)

    Google Scholar 

  9. Youssef, M.W., El-Gendy, H.: Securing authentication of TCP/IP layer two by modifying challenge-handshake authentication protocol. Adv. Comput. Int. J. (ACIJ) 3 (2012)

    Google Scholar 

  10. Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) Cryptographic Hardware and Embedded Systems—CHES 2007. Proceedings of 9th International Workshop, Vienna, Austria, vol. 4727, pp. 450–466. Springer, LNCS (2007)

    Google Scholar 

  11. Augot, D., Finiasz, M.: Direct construction of recursive MDS diffusion layers using shortened BCH codes. In: Cid, C., Rechberger, C. (eds.) Fast Software Encryption—21st International Workshop, FSE 2014, London, UK, March 3–5, 2014. Revised Selected Papers. Lecture Notes in Computer Science, vol. 8540, pp. 3–17. Springer (2014)

    Google Scholar 

  12. Eisenbarth, T., Paar, C., Poschmann, A., Kumar, S., Uhsadel, L.: A survey of lightweight cryptography implementations. IEEE Design Test Comput. (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suhasini Sodagudi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Sodagudi, S., Kurra, R.R. (2017). An Approach to Identify Data Leakage in Secure Communication. In: Deiva Sundari, P., Dash, S., Das, S., Panigrahi, B. (eds) Proceedings of 2nd International Conference on Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, vol 467. Springer, Singapore. https://doi.org/10.1007/978-981-10-1645-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1645-5_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1644-8

  • Online ISBN: 978-981-10-1645-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics