International Journal of Engineering Trends and Technology (IJETT) – Volume 29 Number 7 - November 2015 Privacy Preserving of Information Dissemination Controlling in Wireless Network Katikam Mahesh1,V.Lakshmiprasad2 1 Final M.Tech Student, 2Asst.professor 1,2 Dept of CSE, Sarada Institute of Science, Technology andManagement (SISTAM), Srikakulam, Andhra Pradesh Abstract: Now a day’s sharing information in wireless communication is more capabilities and also provide privacy of transferring information in mobile device. So that to broad cast information in with secure manner to receiver as well as to provide more efficiency in the network. In this paper we are consider the nodes strength for calculating communication of each node in the network. After finding node strength each node we can identify path from sender node to receiver. Before finding shortest path we can identify the given nodes are genuine or malicious nodes in the network. After finding we can find out shortest path from sender node to destination by using average nodes strength shortest path algorithm. After finding shortest path the sender will send information to destination node. Before sending information can be convert unknown format by using tiny transpose encryption algorithm. By implementing those concepts we can controlling transferring information, provide security of transferring information and more efficiency to network. Keywords: Cryptography, malicious, wireless network. Security, routing, I. INTRODUCTION This paper proposes concepts that aim to provide broad casting information of in the wireless network. Today so many technologies are available for providing service to controlling information dissemination. In this paper we are implementing cooperate communication mechanism for controlling information dissemination in wireless network. In the cooperate communication network contains concepts of finding malicious nodes and also provide controlling information in a wireless network. Another concept can be proposed for the security of transferring message. To provide security of transferring of message we are implementing concepts of the cryptography. By implementing this source node will perform the encryption process and convert the plain format data into cipher text. After the converting the source node will send the data through destination node. The destination node will retrieve the cipher format data and convert into plain format by using decryption process of cryptography. ISSN: 2231-5381 In this paper consider other concept for finding genuine node or malicious node in the wireless network. So that to perform the identification of genuine node or malicious node is a most important part of our wireless network. Because in the wireless network so many nodes are available for sharing information. So that there chance for corrupt transferring data. By implementing these concepts we can overcome corruption of transferring data. Before transferring data from source node to destination node the server will perform identification of nodes. In this paper we are assuming the any two nodes are malicious nodes and reaming are the genuine nodes. The selection process of malicious nodes can done by the dynamically. The server will perform the selection process of malicious nodes and genuine nodes in the network. After completion of identification process the server will perform the routing from source node to destination node. In this paper we are using signal strength and channel capacity of each node can be consider for find the routing from source node to destination node. Before finding routing from source node to destination the server will find out the average distance from source node to all other nodes. After finding average distance the server will calculate near distance from source node to destination nodes. So that by using those distance we can find out near nodes from source node and generate routing from source node to destination node. After that the source node will sent information through the routing path and reach the destination node. By implementing this concept we can improve the network efficiency and also transfer the message with secure manner. In this paper also consider another concept for provide security of transferring data through the wireless network. By implementing this concept we provide more security of transferring message. The implementation this concept can be used by using one of the cryptography technique. In this paper we are using tiny transpose encryption and decryption algorithm for converting message to unknown format. By implementing this concepts we can improve the provide security and also improve efficiency of wireless network. Because by implementing this concept we can overcome burden http://www.ijettjournal.org Page 337 International Journal of Engineering Trends and Technology (IJETT) – Volume 29 Number 7 - November 2015 of bit shifting operation and also to overcome repeated test. In the cryptography techniques using symmetric key cryptography we are encrypt repeated data, it easily identify type of algorithm to be used. So that this is another disadvantage of symmetric key cryptography. So that by implementing proposed system it will not face the problem of repeated content. Another advantage of proposed system is no need to use the secret key for the encryption and decryption of plain type of message. By considering those solution we can specify the our proposed system is more efficient and more privacy of transferring message. The remainder of this paper is organized as follows. Section 2 is used to specify the related work our proposed system. Section 3 is used describe the implementation procedure of our propose system. Section 4 is to specify the conclusion of our propose system. Section 5 is to specify the references to be used for our proposed system. II. RELATED WORK In this section we review literature closely related to our proposed system. To days so many types of controlling of information dissemination. By implementing those techniques we can broad casting message to all other nodes in a network. Here we are only focus on broad casting information from the source node to destination node with secure manner. In a wireless broad casting [1][2] to transmission of data mainly depending on the reliability and over head of transmitting. To implementing broad casting information some of silent features are available in the network. One of the approach is fountain codes[3][4] is to improve more reliability and reduce transmission over head in the network.For example, Kumar et al. [3] propose FB cast, a new broadcast protocol that improves sensor networks’ wireless broadcast reliability using LT codes. Fountain codes are sparse graph codes for channels with erasures. They are an important technique to reduce redundancy caused by data retransmission. An idealized digital fountain should have the following properties [4]: 1) A sender can generate a potentially infinite supply of encoding packets from the original data. Encoding packets should be generated in constant time per packet given the original data; and 2) A receiver can reconstruct a message that would require k packets to send once any k encoding packets have been received. The reconstruction time should preferably be linear in k. Approximations to a digital fountain can be obtained from the idealized version by loosening the requirements in various ways. Four representative codes are: 1. Reed-Solomon codes [5]; ISSN: 2231-5381 2. Tornado codes [6]; 3. Luby Transformation (LT) codes [7]; and 4. Raptor codes [8]. On the practical scheme side, there have been studies on classical problems of secret sharing [9], [10], [11], [12], [13].The usual setting is that a sender encrypts a message into several parts, and some sets of qualified receivers can pool their received parts to reconstruct the message, while on the other hand unqualified users cannot retrieve the information even if they pool their shares together. These works and their follow-up works are different in spirit from Turf Cast. In these works, the encryption scheme is predefined, i.e., they have predefined qualified users and sometimes have a predefined set of knowledge to serve as keys. However, in Turf Cast, we do not have either the Concept of a key or a predefined set of qualified users. Any users lingering long enough near a designated spot can be qualified to receive the information. So the group of qualified users is highly dynamic and fluid, which hardly allows a systematic cryptographic scheme. III. PROPOSED SYSTEM In this proposed architecture we are introduce an evolutionary algorithm for cooperate communication between nodes. The cooperate communication can be done by using signal strength and channel capacity for the purpose of transferring data. By implementing cost communication shortest path algorithm we can identify shortest path between the source node to destination for transferring data. Before transferring data from source node to destination node we can perform the cryptography technique. In this paper we are proposed two bit change transpose technique for encryption and decryption of transferring data. Node Construction: In this module we construct a general node to node communication through the socket programming, Every node can communicate with each other .data packet can be transmitted from source node to destination node, Each node acts as server, it can accept the any connection and receives the data packets from any other node and transmits the data packets to other node. Before transferring data packet form one node to other the server will find out which node genuine node or malicious node. Identification of Genuine or malicious nodes in network: In this module we can identify genuine node or malicious node in network. The identification process can be done by the server in the network. Before identify the server will generate shared value http://www.ijettjournal.org Page 338 International Journal of Engineering Trends and Technology (IJETT) – Volume 29 Number 7 - November 2015 and send to all nodes in a network. In this module the server will choose two nodes as malicious nodes for performing identification process of genuine or malicious. So that the server before sending shared value will choose two nodes as malicious and send different value. After that the nodes will retrieve the shared value from server and generate individual hash code of each node. After generating hash code the nodes will send to server. Based on hash value the server will find out malicious nodes in the network. After identifying malicious nodes each user find out shortest path from source node to destination node. Average Nodes Algorithm: Strength Shortest Path The implementation Average Nodes Strength Shortest Path algorithm finding shortest path. Before finding shortest path we are initialize each node signal strength and stored into database. After that we can also specify the out signal strength node in network. The implementation process of Average node strength shortest path algorithm is as follows. 1. 2. 3. Get the all nodes of signal strength (Si). Find out average signal strength from source node to destination node by using following formula. avg= S1+ S2 +………+Si /i Finding distance source node to other nodes by using following formula Int max=0; Encryption Algorithm: 1. Enter the transferring message and add randomized character between plain text. After each 3 character of plain text we can add the duplicate character. 2. After adding duplicate character we can convert into ascii format. 3. The ascii values can be converting into eight bit block and divide eight bit block into two parts. 4. After conversion two parts take the right block and reverse it. 5. Takenthose binary values and generates 32* 32 matrixes by using second level data. 6. After completion matrix generation we can perform circular transpose the matrix. 7. That transpose data can be transferred to destination through the path. Decryption Algorithm: The destination node will retrieve the cipher format message from the source node and decrypt that data by using following steps. 1. The cipher message will be converting into binary format. 2. Take the binary formats data and generate forming 32* 32 matrix format. Int min=S[i]; 3. After generating matrix we can perform the circular shift matrix we can get another matrix formatted data. If(max<min) { Max=min; } 4. After finding distance of each node we can arrange the path from source node to destination node. 5. So that the data send through path and reached the destination node. After finding the path source node will transfer the data through path to destination node. Before sending data to destination node the source node will encrypt the data and transfer to destination node. The implementation procedure of tiny transpose encryption algorithm as follows. 4. Take those binary values and divide those binary values equal eight bit parts. Tiny Transpose Encryption and Decryption Algorithm: 8. After converting ascci format we can convert into character and remove duplicate getting original message. 5. Take each eight bit binary values and split into two equal parts. 6. After splitting take the right part and revers that part. 7. After completion of reversing take that eight bit and convert into ascci format. This process continues till completion of total parts. The implementation procedure of encryption and decryption is as follows. ISSN: 2231-5381 http://www.ijettjournal.org Page 339 International Journal of Engineering Trends and Technology (IJETT) – Volume 29 Number 7 - November 2015 By implementing those concepts we can reduce time complexity for finding shortest path and also provide more security of transferring data. BIOGRAPHIES: IV. CONCLUSION This paper presented newly evolutionary algorithm for finding shortest path source node and destination node. By implementing this algorithm we can find out shortest path and send data through that path. In this paper we also implement another approach for providing security of transferring data. So that every source node will perform one of the cryptography approach for converting data into unknown format. In this paper we are implementing tiny transpose encryption algorithm for encryption and decryption of transferring message. By implementing that concept we can improve network efficiency and also reduce time complexity. Another advantage is that to provide more security of transferring data. V. REFERENCES Katikam Mahesh is a Student inM.Tech(CSE) in Sarada Institute of science Technology Andmanagement, Srikakulam. He Receivedher B.Tech(CSE) from chebrolu engineering college ,chebrolu , guntur. His interesting areas are network security and data mining. Mr.V.Laxmiprasad is working as a Asst.professor in Sarada Institute of Science, Technology And Management,Srikakulam, Andhra Pradesh. He receivedhis M.Tech (CSE) from GMRIT Rajam,Srikakulam District, JNTU KakinadaAndhra Pradesh. His research areas include Computer networks,Datawarehouse and Datamining. [1].B. Williams and T. Camp, “Comparison of Broadcasting Techniquesfor Mobile Ad Hoc Networks,” Proc. ACM MobiHoc, pp. 194205, 2002. [2] F. Wang, M.T. Thai, Y. Li, X. Cheng, and D.-Z. Du, “FaultTolerantTopology Control for All-to-One and One-to-All Communicationin Wireless Networks,” IEEE Trans. Mobile Computing, vol. 7, no. 3,pp. 322-331, Mar. 2008. [3] A. Kumar, A. Paul, U. Ramachandran, and D. Kotz, “OnImproving Wireless Broadcast Reliability of Sensor NetworksUsing Erasure Codes,” Proc. Second Int’l Conf. Mobile Ad-Hoc andSensor Networks (MSN), pp. 155-170, 2006. [4] N. Dutsch, H. Jenkac, T. Mayer, and J. Hagenauer, “Joint Source-Channel-Fountain Coding for Asynchronous Broadcast,” Proc.First Mobile and Wireless Comm. Summit Conf., 2005. [5] M. Mitzenmacher, “Digital Fountains: A Survey and LookForward,” Proc. Information Theory Workshop, 2004. [6] I. Reed and G. Solomon, “Polynomial Codes over Certain FiniteFields,” J. SIAM, vol. 8, pp. 300-304, 1960. [7] M. Luby, M. Mitzenmacher, A. Shokrollahi, and D. Spielman,“Efficient Erasure Correcting Codes,” IEEE Trans. InformationTheory, vol. 47, no. 2, pp. 569-584, Feb. 2001. [8] M. Luby, “LT Codes,” Proc. 43rd Symp. Foundations of ComputerScience (FOCS), pp. 271-282, 2002. [9] A. Shokrollahi, “Raptor Codes,” IEEE Trans. Information Theory,vol. 52, no. 6, pp. 2551-2567, June 2006. [10].A. Shamir, “How to Share a Secret,” Comm. ACM, vol. 22, pp. 612-613, Nov. 1979. [11] G.J. Simmons, “An Introduction to Shared Secret and/or SharedControl Schemes and Their Applications,” Contempory Cryptology,IEEE, 1991. [12] D. Stinson, “An Explication of Secret Sharing Schemes,” Design,Codes, and Cryptography, vol. 2, pp. 357-390, 1992. [13] A.C. Yao, “Protocols for Secure omputations,” Proc. IEEE Symp.Foundations of Computer Science, pp. 160-164, 1982. [14] A.C. Yao, “How to Generate and Exchange Secrets,” Proc. IEEESymp. Foundations of Computer Science, pp. 162-167, 1986. [15] L. Lai, Y. Liang, W. Du, and S. Shamai, “Secret Sharing via NoisyBroadcast Channels,” Proc. IEEE Int’l Symp. Information Theory(ISIT), pp. 1955-1959, Aug. 2011. [16] G. Miklau and D. Suciu, “Controlling access to published data using cryptography,” in Proc. 29th Int. Conf. VLDB, Berlin,Germany, 2003, pp. 898–909. ISSN: 2231-5381 http://www.ijettjournal.org Page 340