Network and Data Security using Onion Routing Protocol with Salt Method & Used Wireless Mesh Network

Authors

  • Er. Ritu Aggarwal  HOD, MTech. (CSE), Himalayan Group of Professional Institutions , Kala Amb, Himachal Pradesh, India

Keywords:

Onion, Salt, Encryption, Security TOR

Abstract

Electronic communication is becoming an important issue now's day. Hiding the details of communication, content, nodes from the adversaries like an eavesdropper, hacker etc is usually not considering before. Encryption is becoming the most important part of all the communication channels. Onion routing is an anonymous connection that can provide support anonymous mail as well as other applications. The nodes include in the network cannot be always trusted, since a valid node may be captured by enemies and becomes malicious. Onion routing with salt is the secure network topology that help to protect the data and the network after the enemy captures the node path. Onion routing with salt make the network more secure and data more protected. To create this and provide main aim of onion routing its uses public key encryption with salting method to put multiple layer of encryption around the original data thus making an onion like structure and each layer between source to destination peel off each layer of encryption. The wireless nature of such networks allows users to access network resources from nearly any convenient location within their primary networking environment. Registered users can connect to the network from anywhere a router or another connected user is available without being identified or tracked. The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access which also gives good security for anonymous transmission of data

References

  1. Uma Somani, Kanika Lakhani, Manish Mundra "Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing" 2010 IEEE 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010).
  2. G Jai Arul Jose, C. Sajeev, and Dr. C. Suyambulingom proposed to generate RSA Public keys and Private Keys for public and private access, 2009.
  3. Wei Liu: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments" , IEEE Transaction on vehicular technology,Vol.63,no.9,November 2014.
  4. Onion Routing for Resistance to Traffic Analysis by Paul Syverson, 2003, IEEE
  5. K. Kaviya" Network Security Implementation by Onion Routing" 2009 International Conference on Information and Multimedia Technology.
  6. Michael Backes,"Provably Secure and Practical Onion Routing", 2012 IEEE 25th Computer Security Foundations Symposium
  7. Wu and Li S, Khan, Nabil A. Alrajeh, and K.-K. Loo, "Secure route selection in wireless mesh networks", Computer Networks, vol. 56, no. 2, 2012, pp. 491-503.
  8. J Ben-Othman,. and Y.I.S. Benitez, "IBC-HWMP: a novel secure identity-based cryptography-based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s", Concurrency and Computation Practice and Experience, 2011, DOI: 10.1002/cpe.1813.
  9. Ben-Othman "Achieving Privacy in Mesh Networks", In Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '06), Alexandria, VA, USA, pp. 13-22.
  10. Benitez M. Reed, P. Syverson, and D. Goldschlag, "Anonymous Connections and Onion Routing", IEEE Journal on Selected Areas in Communication, vol. 16, no. 4, 1998, pp. 482 - 494.
  11. Jin yuan Sun, Member, IEEE, Chi Zhang, Student Member, IEEE, Yanchao Zhang, Member, IEEE, and Yuguang Fang, Fellow, IEEE "SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks". IEEE Transactions On Dependable And Secure Computing, Vol. 8, No. 2, MarchApril 2011.
  12. Chi-Yin Chow, Student Member, IEEE, Mohamed F. Mokbel," A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks" IEEE Transactions On Mobile Computing, Vol. 10, No. 1, Jan 2011.
  13. David chaum "Blind signatures for untraceable payments" copyright(c) 1998,springer-verlag

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Er. Ritu Aggarwal, " Network and Data Security using Onion Routing Protocol with Salt Method & Used Wireless Mesh Network, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.949-956, May-June-2018.