Abstract
In the field of wireless networks, Mobile Ad hoc Network (MANET) is one of the most unique applications due to mobility and scalability. As it is vulnerable to malicious attackers with the open medium and wide distribution, network performance is degraded with the behavior attacks in MANET’s, which makes protection most important. In any ad hoc networks, one of the situations is that, when a data distributor possesses sensitive data destined to a set of supposedly trusted parties, some data can be leaked at an authorized place. With the introduction of fake objects the data allocation strategies gives a path in identifying leakages ensuring more security with encryption. In this context, light weight system is proposed to characterize the data loss and to minimize the performance degradation in such networks. The light weight system includes the concept of cryptography and routing protocol implementation at different stages of data transfer. A social network is taken as a challenging issue to achieve the proposed scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Royer, E.M., Toh, C.K.: A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Pers. Commun. (1999)
Renu, B., Mandoria H.L., Pranavi, T.: Routing Protocols in Mobile Ad-Hoc Network: A Review, pp. 52–60. Springer, LNCS (2013)
Vulimiri, A., Gupta, A., Roy, P., Muthaiah, S.N., Kherani, A.A.: Application of secondary information for misbehavior detection in VANETs. In: IFIP, vol. 6091, pp. 385–396. Springer, LNCS, Berlin (2010)
Cayrichi, E., Rong, C.: Security in Wireless Ad Hoc and Sensor Networks. Wiley, New York (2009)
Papadimitriou, P., Garcia-Molina, H.: Data leakage detection. IEEE Trans. Knowl. Data Eng 23, 51–63 (2011)
Czerwinski, S., Fromm, R., Hodes, T.: Digital Music Distribution and Audio Watermarking. UCB IS 219, Technical report (2010)
Singh, A.: Identifying malicious code through reverse engineering. In: Advances in Information Security, p. 115. Springer, Berlin (2009)
Lu, S., Li, J., Liu, Z., Cui, G.: A secure data transmission protocol for mobile ad hoc networks. In: Chapter Intelligence and Security Informatics, vol. 4430, pp. 184–195. Springer, LNCS (2007)
Youssef, M.W., El-Gendy, H.: Securing authentication of TCP/IP layer two by modifying challenge-handshake authentication protocol. Adv. Comput. Int. J. (ACIJ) 3 (2012)
Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) Cryptographic Hardware and Embedded Systems—CHES 2007. Proceedings of 9th International Workshop, Vienna, Austria, vol. 4727, pp. 450–466. Springer, LNCS (2007)
Augot, D., Finiasz, M.: Direct construction of recursive MDS diffusion layers using shortened BCH codes. In: Cid, C., Rechberger, C. (eds.) Fast Software Encryption—21st International Workshop, FSE 2014, London, UK, March 3–5, 2014. Revised Selected Papers. Lecture Notes in Computer Science, vol. 8540, pp. 3–17. Springer (2014)
Eisenbarth, T., Paar, C., Poschmann, A., Kumar, S., Uhsadel, L.: A survey of lightweight cryptography implementations. IEEE Design Test Comput. (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media Singapore
About this paper
Cite this paper
Sodagudi, S., Kurra, R.R. (2017). An Approach to Identify Data Leakage in Secure Communication. In: Deiva Sundari, P., Dash, S., Das, S., Panigrahi, B. (eds) Proceedings of 2nd International Conference on Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, vol 467. Springer, Singapore. https://doi.org/10.1007/978-981-10-1645-5_4
Download citation
DOI: https://doi.org/10.1007/978-981-10-1645-5_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-1644-8
Online ISBN: 978-981-10-1645-5
eBook Packages: EngineeringEngineering (R0)