International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-6  ( Jun, 2024 )
Past issues
  1. Volume-12,Issue-5  ( May, 2024 )
  2. Volume-12,Issue-4  ( Apr, 2024 )
  3. Volume-12,Issue-3  ( Mar, 2024 )
  4. Volume-12,Issue-2  ( Feb, 2024 )
  5. Volume-12,Issue-1  ( Jan, 2024 )
  6. Volume-11,Issue-12  ( Dec, 2023 )
  7. Volume-11,Issue-11  ( Nov, 2023 )
  8. Volume-11,Issue-10  ( Oct, 2023 )
  9. Volume-11,Issue-9  ( Sep, 2023 )
  10. Volume-11,Issue-8  ( Aug, 2023 )

Statistics report
Oct. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 138
Paper Published : 1629
No. of Authors : 4297
  Journal Paper


Paper Title :
Securing DCIM For Maintaining Cache Consistency In WMN Using Rc6

Author :Ankita Umale, Priyanka Fulare

Article Citation :Ankita Umale ,Priyanka Fulare , (2014 ) " Securing DCIM For Maintaining Cache Consistency In WMN Using Rc6 " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 87-92, Volume-2,Issue-8

Abstract : Mobile devices are building blocks of mobile Ad hoc networks (MANETs). In MANET environment, data caching is an essential feature because it increases the ability of mobile devices to access desired data and it also improves the overall system performance. DCIM (Distributed Cache Invalidation Method) is a client-based cache consistency scheme for caching data items in MANET’s. Caching frequently accessed data item is an effective technique for improving the performance in mobile environment. The invalidation-based approach is an effective method to maintain strong cache consistency. However, this invalidation-based approach suffers from several security attacks. The Invalidation Report (IR) based cache invalidation strategy is used to prevent intruders from dropping or modifying invalidation messages. In the Invalidation-Report (IR) based approach, the server keeps track of all the clients that cache the data items, and send invalidation messages to the client when the data is changed. The invalidation messages are modified or dropped by malicious nodes. To prevent malicious nodes from modifying the IR’s and to authenticate the data source, an effective key- based security algorithm will be applied at the node to reduce overhead and to increase the cache consistency. Extensive analysis and simulations are used to evaluate the proposed scheme. The result will show that the solution can achieve a good level of security with low overhead.

Type : Research paper

Published : Volume-2,Issue-8


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1081   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 50
| Published on 2014-08-01
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY