Identity-Based Encryption Anonymous Communication on the Internet

Authors

  • K. Ravikumar  Assistant Professor, Department of Computer Science, Tamil University (Established by the Govt. of Tamilnadu), Thanjavur, Tamil Nadu, India
  • T. Kathiravan  Research Scholar, Department of Computer Science, Tamil University, Thanjavur, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT195232

Keywords:

Inscrutability, Routing, Pairing-Based Cryptography, Security.

Abstract

Inscrutability is an significant characteristic in a lot of two gathering communication systems. In the era of large data, data confidentiality has happen to significant as extra individual and managerial information is involved. Furthermore, the globe has turn into extra diversify and independent than constantly facing. some peer-to-peer approach have been future in direct to improve the scalability concern of the mount system, excluding they are just capable to provide heuristic protection; in reality, the protection community has been fairly victorious at betrayal the condition of the ability systems using together inert and dynamic attacks. We explain the follow attack as fine as known protections next to these attacks: precursor attacks, crossroads attacks, timing attacks, and Sybil attacks. Earlier occupation find it complicated to implement encryption with network coding not including revealing in total routing information, consequently losing time alone and inscrutability. We compare our system with other existing move towards for various networks. Thus RIOMO securely communicates linking nodes not including disclosing node identities; it also provides dissimilar attractive unidentified properties such as identity privacy, location privacy, direction inscrutability, and sturdiness next to more than a few attacks.

References

  1. J. Mayer, P.Mutchler, and J. C.Mitchell, “Evaluating the privacy properties of telephone metadata,” Proceedings of the National Acadamy of Sciences of the United States of America, vol. 113, no. 20, pp. 5536–5541, 2016.
  2. Y.-A. de Montjoye, Computational PRIvacy: Towards PRIvacy- Conscientious Uses ofMetadata, ProQuestLLC,AnnArbor,MI, 2015.
  3. A. Rusbridger, “The snowden leaks and the public,” New York Review of Books, vol. 60, no. 18, 2013.
  4. D. Evans and N. Paul, “Election security: perception and reality,” IEEE Security & Privacy, vol. 2, no. 1, pp. 24–31, 2004.
  5. X. Zou, B. Ramamurthy, and S. S. Magliveras, Eds., Secure Group Communications over Data Networks. New York, NY, USA, ISBN: 0-387-22970-1 (The ebook ISBN: 0-387-22971-X): Springer, Oct. 2004.
  6. F. Liu and X. Cheng, “LKE: A self-configuring scheme for locationaware key establishment in wireless sensor networks,” IEEE Transactions On Wireless Communications, 2007.
  7. C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” RFC 3561, July 2003.
  8. D. B. Johnson, D. A. Maltz, and Y. Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)” <draft-ietf-manet-dsr-09.txt>, April 2003.
  9. B. Dahill, B. Levine, E. Royer, and C. Shields, “A Secure Routing Protocol for Ad Hoc Networks”, University of Massachusetts Technical Report 01-37, 2001.
  10. ISO99 ISO IS 15408, 1999, available at http://www.commoncriteria.org

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
K. Ravikumar, T. Kathiravan, " Identity-Based Encryption Anonymous Communication on the Internet, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 2, pp.1009-1013, March-April-2019. Available at doi : https://doi.org/10.32628/CSEIT195232