The various security mechanisms to provide security are as follows-
This is hiding or covering of data which provides confidentiality. It is also used to complement other mechanisms to provide other services. Cryptography and Steganography are used for enciphering
2. Digital Integrity:
The data integrity mechanism appends to the data a short check value that has been created by a specific process from the data itself. Data integrity is preserved by comparing check value received to the check value generated.
3. Digital Signature:
A digital signature is a means by which the sender can electronically sign the data and the receiver can electronically verify the signature. Public and private keys can be used.
4. Authentication Exchange:
In this two entities exchange some messages to prove their identity to each other.
5. Traffic Padding:
Traffic padding means inserting some bogus data into the data traffic to thwart the adversary’s attempt to use the traffic analysis.
6. Routing Control:
Routing control means selecting and continuously changing different available routes between sender and receiver to prevent the opponent from eavesdropping on a particular route.
Notarization means selecting a third trusted party to control the communication between two entities. The receiver can involve a trusted third party to store the sender request in order to prevent the sender from later denying that she has made a request.
8. Access Control:
Access control used methods to prove that a user has access right to the data or resources owned by a system. Examples of proofs are passwords and PINs.