TY - GEN
T1 - Enhancing Authenticated Intermediate Node in Rumor Riding Protocol
AU - Christo, Mary Subaja
AU - Rathinam, J. Jeya
AU - Preethi, null
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/11/5
Y1 - 2018/11/5
N2 - This research describes about the Peer to Peer network and data transfer security. P2P network topology is where a grand scale of node connected together each node acts as peer, without the centralized server with the use of internet. When a particular task is assigned to node it acts as peer efficiently on the assigned task. This is a cyclic network topology when it is exposed to replay attack it entirely maliciously or fraudulently to the data transfer. This leads to problematic circularity to network to overcome this Rumor Riding protocolRRP is used. RRP is non path based protocol three nodes are involved to transfer the dataincluding source, intermediate node, destinationthe methodology of data transfer take place through these nodes effectively. In case this node exposed by attacker. RR protocol works without authentication between the source and destination. The main goal of the is to remove the circumstance of the replay attack we use the cryptographic puzzle through challenge question method. The extension of this Reliable Rumor Riding protocol with the security and authentication performance is investigated in this paper.
AB - This research describes about the Peer to Peer network and data transfer security. P2P network topology is where a grand scale of node connected together each node acts as peer, without the centralized server with the use of internet. When a particular task is assigned to node it acts as peer efficiently on the assigned task. This is a cyclic network topology when it is exposed to replay attack it entirely maliciously or fraudulently to the data transfer. This leads to problematic circularity to network to overcome this Rumor Riding protocolRRP is used. RRP is non path based protocol three nodes are involved to transfer the dataincluding source, intermediate node, destinationthe methodology of data transfer take place through these nodes effectively. In case this node exposed by attacker. RR protocol works without authentication between the source and destination. The main goal of the is to remove the circumstance of the replay attack we use the cryptographic puzzle through challenge question method. The extension of this Reliable Rumor Riding protocol with the security and authentication performance is investigated in this paper.
UR - https://www.scopus.com/pages/publications/85057753970
UR - https://www.scopus.com/pages/publications/85057753970#tab=citedBy
U2 - 10.1109/ICCSP.2018.8524350
DO - 10.1109/ICCSP.2018.8524350
M3 - Conference contribution
AN - SCOPUS:85057753970
T3 - Proceedings of the 2018 IEEE International Conference on Communication and Signal Processing, ICCSP 2018
SP - 23
EP - 27
BT - Proceedings of the 2018 IEEE International Conference on Communication and Signal Processing, ICCSP 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 7th IEEE International Conference on Communication and Signal Processing, ICCSP 2018
Y2 - 3 April 2018 through 5 April 2018
ER -