Open Access   Article Go Back

Designing a Graph Anonymization Framework for Secure Packet Transmission in the IP Over Ethernet LAN

R. Ganguli1 , S. Roy2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-9 , Page no. 650-654, Sep-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i9.650654

Online published on Sep 30, 2018

Copyright © R. Ganguli, S. Roy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Ganguli, S. Roy, “Designing a Graph Anonymization Framework for Secure Packet Transmission in the IP Over Ethernet LAN,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.650-654, 2018.

MLA Style Citation: R. Ganguli, S. Roy "Designing a Graph Anonymization Framework for Secure Packet Transmission in the IP Over Ethernet LAN." International Journal of Computer Sciences and Engineering 6.9 (2018): 650-654.

APA Style Citation: R. Ganguli, S. Roy, (2018). Designing a Graph Anonymization Framework for Secure Packet Transmission in the IP Over Ethernet LAN. International Journal of Computer Sciences and Engineering, 6(9), 650-654.

BibTex Style Citation:
@article{Ganguli_2018,
author = {R. Ganguli, S. Roy},
title = {Designing a Graph Anonymization Framework for Secure Packet Transmission in the IP Over Ethernet LAN},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {650-654},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2923},
doi = {https://doi.org/10.26438/ijcse/v6i9.650654}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.650654}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2923
TI - Designing a Graph Anonymization Framework for Secure Packet Transmission in the IP Over Ethernet LAN
T2 - International Journal of Computer Sciences and Engineering
AU - R. Ganguli, S. Roy
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 650-654
IS - 9
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
451 257 downloads 216 downloads
  
  
           

Abstract

Ethernet Local Area Network (LAN) has become almost omnipresent today. Ethernet has scored over its competitor LAN technologies because of its simplicity, ruggedness and low cost as well as, the advantages it enjoyed owing to its early entry into the LAN market. Despite many research work and development efforts in the area of data communication’s security, the importance of internal local area network LAN security is still underestimated. Ethernet LAN has always been known to be an insecure technology. There is no way in the Ethernet LAN protocol to check the authentication or message integrity. Intruder can hack the IP packet header and create packets with false IP addresses or MAC addresses. In this paper we discuss about the design of a secured packet transport scheme in the IP over Ethernet LAN (IPEL) based on graph anonymization approach. To ensure secure communication, the identity of IP packet source and destination needs to be hidden from intruder. In our proposed scheme each host in the IPEL encrypts the header part of IP packet using graph anonymization algorithm and forwards to the next node. On receiving the packet host performs decryption using graph de-anonymization algorithm to read the packet header. This approach of securing IP packet header offers good scalability, possibly low cost and also promises a reasonable level of security in the IPEL.

Key-Words / Index Term

Encryption, Decryption, IPEL, IPSec, SSL, Graph Anonymization

References

[1] A.S. Tenenbaum,”ComputerNetworks”, 4th Ed., Pearson Education Asea, LPE, 2003.
[2] J.F. Kurose ad K.W. Ross, ”Computer Networking: A Top-Down Approach Featuring the Internet”, 3rd Ed., Pearson Education Asea, LPE,2005.
[3] B. A. Forouzan, "Data Communications ad Networking”, 4th Ed., Tata McGraw-Hill, New Delhi, 2004.
[4] Metcalfe, R.M ad Boggs, D.R, “Ethernet: Distributed Packet Switching for Local Computer Networks”, Communication of the ACM. Vol 19, pp 395-404, July 1976.
[5] C.E. Spurgeon,, “Ethernet-The Definitive Guide”, Orielly/Shroff Publishers & Distributors (India), 2000.
[6] A Leon,-Garcia and I. Widjaja, ”Communication Networks”, 2nd Ed., Tata McGraw-Hill, New Delhi, 2004.
[7] R. Perlman, ”Interconnections: Bridges ad Routers”, Addison Wesley,1994.
[8] L. L. Peterson ad B.S. Davie, ”Computer Networks: A systems Approach”, 3rd Ed. Morgan Kaufman, 2003
[9] D. E. Comer, “Internetworking with TCP/IP Principles, Protocols, and Architecture”, 4th Ed., Prentice-Hall, 2003
[10] W. Stallings, "Network Security Essentials: Application ad Stadards “, 4th Ed.,Pearson Eduction Asea,LPE,2013
[11] J. Katz,Y. Lindell, ”Introduction to modern cryptography” Chapman & Hall/CRC Press, 2007.
[12] N.Deo, ,”Graph Theory with Applications to Engineering and Computer Science”, New Ed, Prentice-Hall, 2003.
[13] C.C. Aggarwal, Y.Li and P.S.Yu, “On the hardness of graph annonymization.” In Proceedings of the 11th IEEE International Conference on Data Mining(ICDN’11),pp 1002-10007,IEEE,2011
[14] K. Liu, , and E. Terzi,. “Towards identity anonymization on graphs”. In SIGMOD Conference (2008), pp. 93–106.