Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Network Security Based on Cryptographic Techniques

M. Nachammai, R. Krithika, A. Madhusri

Abstract


Network security is mainly used to provide security for the information which has been transmitted from one party to another party, which should not get accessed by the unauthorised people.  This survey provides an overview of network security and the techniques of cryptography through which the security can be provided in all sort of the complete information travelling through networks.   The information/data generally passing as a form of packets from one end to another end. Meanwhile how the information's will get protected is the main challenge and it is been protected by the technique called "CRYPTOGRAPHY".


Keywords


Network Security, Unauthorised Access, Packets, Cryptography

Full Text:

PDF

References


Jerome Francois, Issam Aib, and Raouf Boutaba, "FireCol: a collaborative protection network for the detection of flooding DDoS attacks", IEEE/ACM Transactions on Networking (TON), vol. 20, no. 6, pp. 1828-1841, April 2012.

Bhimsingh Bohara and Varun Sharma, "Analysis and Prevention of effects of gray hole attacks on Routing Protocol in Mobile Ad-hoc Networks", International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 6, pp. 2468-2472, June 2013.

Panagiotis Papadimitratos and Zygmunt J, "Secure Data Communication in Mobile Ad Hoc Networks", IEEE, vol. 24, no. 2, pp. 343-356, February 2006.

G.S.G.N. Anjaneyulu, V. Madhu Viswanatham, and B. Venkateswarly, "Secured and authenticated transmission of data using multipath routing in mobile AD-HOC networks", Advances in Applied Science Research, vol. 4, no. 2, pp. 177-186, 2011.

J.W. Cai; P. Yi, Y. Tian, Y.K. Zhou, N. Liu, The Simulation and Comparison of Routing Attacks on DSR Protocol[C], WiCOM 2009, in press.

B. Sun; Y. Guan; J. Chen; U.W. Pooch, Detecting Black-hole Attack in Mobile Ad Hoc Networks[C]; 5th European Personal Mobile Communications Conference, 2003, 490-495.

A. Patcha; A. Mishra; Collaborative security architecture for black hole attack prevention in mobile ad hoc networks[C]; Radio and Wireless Conference, 2003, 75-78.

Anitha and J. Akilandeswari, "Secured Message Transmission in Mobile AD-HOC Networks through Identification and Removal of Byzantine Failures", InterJRI Computer Science and Networking, vol. 2, no. 1, pp. 14-18, August 2010.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.