2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Jul 1, 2013
Mobile Ad Hoc Networks (MANETs) are self organized networks whose nodes are free to move randomly... more Mobile Ad Hoc Networks (MANETs) are self organized networks whose nodes are free to move randomly while being able to communicate with each other without the help of an existing network infrastructure. Ad hoc on-demand distance vector routing (AODV) is demand driven one of the best and popular routing algorithm. AODV is severely affected by well-known black hole attack in which a malicious node injects a fake route reply message that it has a fresh route towards destination. In this paper, a novel approach is proposed that makes a modification in existing AODV routing protocol. A novel approach finds the safe route between sending and receiving node. The simulations show that the proposed approach is efficient than normal AODV with high packet delivery ratio and throughput.
In insecure communication, data hiding techniques have an important role to protect private/impor... more In insecure communication, data hiding techniques have an important role to protect private/important information from unauthorized access. Steganography is a hiding technique that hides the secret information inside the digital medium in undetectable manner. We believe that a good steganography technique requires high embedding capacity without compromising security as well. In this paper, an image steganography method based on combination of LSB, DCT and Huffman Encoding is proposed. Two 8 bit gray level images are used, first one as a cover image and second as a secret image. Before embedding the secret image inside cover image, Huffman Encoding is applied on the secret image to reduce the payload and hence embedding capacity is increased. Then Discrete Cosine Transform (DCT) is applied to obtain DCT coefficients of cover image. DCT coefficients are used to select random pixel locations for hiding bits of Huffman codes. The stego image is a result of hiding each bit from Huffman code of secret image in Least Significant Bit of the cover image at random locations based on threshold. The experimental result shows that the proposed algorithm has high embedding capacity and good invisibility of secret data. PSNR value is used to compare the result with other existing Steganography approaches. In addition, high security is maintained since the secret image cannot be extracted without the knowledge of decoding rules, Huffman table and the Key Matrix.
Mobile Ad Hoc Networks (MANETs) are self organized networks whose nodes are free to move randomly... more Mobile Ad Hoc Networks (MANETs) are self organized networks whose nodes are free to move randomly while being able to communicate with each other without the help of an existing network infrastructure. MANETs are suitable for use in situations where any wired or wireless infrastructure is inaccessible, overloaded, damaged or destroyed such as emergency or rescue missions, disaster relief efforts and tactical battlefields, as well as civilian MANET situations, such as conferences and classrooms or in the research area like sensor networks. MANETs eliminate this dependence on a fixed network infrastructure where each station acts as an intermediate switch. Black hole attack is one of the severe security threats in ad-hoc networks which can be easily employed by exploiting vulnerability of on- demand routing protocols such as Ad-Hoc On Demand distance vector (AODV). In this paper, we have surveyed and compared the existing solutions to black hole attacks on AODV protocol
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Jul 1, 2013
Mobile Ad Hoc Networks (MANETs) are self organized networks whose nodes are free to move randomly... more Mobile Ad Hoc Networks (MANETs) are self organized networks whose nodes are free to move randomly while being able to communicate with each other without the help of an existing network infrastructure. Ad hoc on-demand distance vector routing (AODV) is demand driven one of the best and popular routing algorithm. AODV is severely affected by well-known black hole attack in which a malicious node injects a fake route reply message that it has a fresh route towards destination. In this paper, a novel approach is proposed that makes a modification in existing AODV routing protocol. A novel approach finds the safe route between sending and receiving node. The simulations show that the proposed approach is efficient than normal AODV with high packet delivery ratio and throughput.
In insecure communication, data hiding techniques have an important role to protect private/impor... more In insecure communication, data hiding techniques have an important role to protect private/important information from unauthorized access. Steganography is a hiding technique that hides the secret information inside the digital medium in undetectable manner. We believe that a good steganography technique requires high embedding capacity without compromising security as well. In this paper, an image steganography method based on combination of LSB, DCT and Huffman Encoding is proposed. Two 8 bit gray level images are used, first one as a cover image and second as a secret image. Before embedding the secret image inside cover image, Huffman Encoding is applied on the secret image to reduce the payload and hence embedding capacity is increased. Then Discrete Cosine Transform (DCT) is applied to obtain DCT coefficients of cover image. DCT coefficients are used to select random pixel locations for hiding bits of Huffman codes. The stego image is a result of hiding each bit from Huffman code of secret image in Least Significant Bit of the cover image at random locations based on threshold. The experimental result shows that the proposed algorithm has high embedding capacity and good invisibility of secret data. PSNR value is used to compare the result with other existing Steganography approaches. In addition, high security is maintained since the secret image cannot be extracted without the knowledge of decoding rules, Huffman table and the Key Matrix.
Mobile Ad Hoc Networks (MANETs) are self organized networks whose nodes are free to move randomly... more Mobile Ad Hoc Networks (MANETs) are self organized networks whose nodes are free to move randomly while being able to communicate with each other without the help of an existing network infrastructure. MANETs are suitable for use in situations where any wired or wireless infrastructure is inaccessible, overloaded, damaged or destroyed such as emergency or rescue missions, disaster relief efforts and tactical battlefields, as well as civilian MANET situations, such as conferences and classrooms or in the research area like sensor networks. MANETs eliminate this dependence on a fixed network infrastructure where each station acts as an intermediate switch. Black hole attack is one of the severe security threats in ad-hoc networks which can be easily employed by exploiting vulnerability of on- demand routing protocols such as Ad-Hoc On Demand distance vector (AODV). In this paper, we have surveyed and compared the existing solutions to black hole attacks on AODV protocol
Uploads
Papers by Ashish Nimavat