Cryptography Based Privacy Preserving Data Transmission in Hybrid Wireless Networks

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2016 by IJCOT Journal
Volume - 6 Issue - 6
Year of Publication : 2016
Authors :  P.Priya, R.Jayakumar

Citation

P.Priya, R.Jayakumar"Cryptography Based Privacy Preserving Data Transmission in Hybrid Wireless Networks", International Journal of Computer & organization Trends (IJCOT), V6(6):5-9 Nov - Dec 2016, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract Distributed Three-hop Routing protocol (DTR) is used for data transmission in Hybrid wireless network. DTR split a data into segments and transmits the segment in a distributed manner. It uses at most two hops in ad-hoc transmission mode and one hop in cellular transmission mode. However, the selection of trust nodes for data transmission is complicated in DTR which in turn creates security issues. This paper proposes a TEEN APTEEN SPEED (TAS) protocol for trust node selection. TAS protocol allocates a threshold value to each node in a network. Based on the threshold value, a trust node is selected for efficient data transmission in Hybrid Wireless Network. The threshold value is also to maintain security in the network in order that unauthorized spoofing nodes can’t enter the network. Furthermore, this paper implements overhearing technique in which the sending node share the content with one or more other nodes before data transmission with the intention that failure node can be discovered and replaced.

References

[1] Haiying shen, Ze Li, and Chenxi Qiu, “A Distributed Three- Hop routing protocol to increase the capacity of hybrid wireless networks,” IEEE Transactions on Mobile computing, 2015.
[2] B. Bengfort, W. Zhang, and X. Du “Efficient resource allocation in hybrid wireless networks,” In Proc. of WCNC, 2011.
[3] L. M. Feeney, B. Cetin, D. Hollos, M. Kubisch, S. Mengesha, and H. Karl, “Multi-rate relaying for performance improvement in IEEE 802.11 wlans,” In Proc. of WWIC, 2007.
[4] X. J. Li, B. C. Seet, and P. H. J. Chong, “Multi-hop cellular networks: Technology and economics,” Computer Networks, 2008.
[5] K. Akkarajitsakul, E. Hossain, and D. Niyato, “Cooperative packet delivery in hybrid wireless mobile networks: A coalitional game approach,” IEEE Trans. Mobile Computing 2013.
[6] P. Thulasiraman and X. Shen, “Interference aware resource allocation for hybrid hierarchical wireless networks,” Computer Networks, 2010.
[7] L. B. Koralov and Y. G. Sinai, “Theory of probability and random processes,” Berlin New York Springer, 2007.
[8] D. M. Shila, Y. Cheng, and T. Anjali, “Throughput and delay analysis of hybrid wireless networks with multi-hop uplinks,” In Proc. of INFOCOM, 2011.
[9] T. Liu, M. Rong, H. Shi, D. Yu, Y. Xue, and E. Schulz, “Reuse partitioning in fixed two-hop cellular relaying network,” In Proc. of WCNC, 2006.
[10] C. Wang, X. Li, C. Jiang, S. Tang, and Y. Liu, “Multicast throughput for hybrid wireless networks under Gaussian channels model,” TMC, 2011.

Keywords
Hybrid wireless networks, Cryptography, Trust node, Overhearing.