International Journal of Advance Computational Engineering and Networking (IJACEN)
.
current issues
Volume-8,Issue-4  ( Apr, 2020 )
Past issues
  1. Volume-8,Issue-3  ( Mar, 2020 )
  2. Volume-8,Issue-2  ( Feb, 2020 )
  3. Volume-8,Issue-1  ( Jan, 2020 )
  4. Volume-7,Issue-12  ( Dec, 2019 )
  5. Volume-7,Issue-11  ( Nov, 2019 )
  6. Volume-7, Issue-10  ( Oct, 2019 )
  7. Volume-7, Issue-9  ( Sep, 2019 )
  8. Volume-7, Issue-8  ( Aug, 2019 )
  9. Volume-7, Issue-7  ( Jul, 2019 )
  10. Volume-7, Issue-6  ( Jun, 2019 )

Statistics report
Aug. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 87
Paper Published : 1231
No. of Authors : 3095
  Journal Paper

Paper Title
Securing DCIM For Maintaining Cache Consistency In WMN Using Rc6

Abstract
Mobile devices are building blocks of mobile Ad hoc networks (MANETs). In MANET environment, data caching is an essential feature because it increases the ability of mobile devices to access desired data and it also improves the overall system performance. DCIM (Distributed Cache Invalidation Method) is a client-based cache consistency scheme for caching data items in MANET’s. Caching frequently accessed data item is an effective technique for improving the performance in mobile environment. The invalidation-based approach is an effective method to maintain strong cache consistency. However, this invalidation-based approach suffers from several security attacks. The Invalidation Report (IR) based cache invalidation strategy is used to prevent intruders from dropping or modifying invalidation messages. In the Invalidation-Report (IR) based approach, the server keeps track of all the clients that cache the data items, and send invalidation messages to the client when the data is changed. The invalidation messages are modified or dropped by malicious nodes. To prevent malicious nodes from modifying the IR’s and to authenticate the data source, an effective key- based security algorithm will be applied at the node to reduce overhead and to increase the cache consistency. Extensive analysis and simulations are used to evaluate the proposed scheme. The result will show that the solution can achieve a good level of security with low overhead.


Author - Ankita Umale, Priyanka Fulare

| PDF |
Viewed - 42
| Published on 2014-08-01
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY