Efficient Key Mechanisms in Multi-node Network for Secured Data Transmission
نویسنده
چکیده
*Thapar University, Patiala, India **GNDU, Amritsar, India Ex-Principal, MIMIT, Malout, India Abstract: Cryptography is a technique used to avoid unauthorized access of data. It is the technique of scrambling data to make it indecipherable to all, except the intended person. It includes encryption algorithm and reliable key(s). It is clear that key design flaws account for 50 percent of security problems, and architectural risk analysis plays an important role in any solid security program. The importance of key management has been profound, since most attacks to encryption algorithm are based on vulnerabilities caused by poorly designed and developed key management. The strength of the model depends upon the key length. Keys having short lengths are not suitable for secure transmission in multinode network (MN) because they results in more hacking time. If large key lengths are used then they leads to more processing time. Therefore it is highly required to frame a model which provides the flexibility to the user to select the keys having variable lengths. The main highlight of the work is to reduce the time available to the hacker by using S-Boxes and variable key lengths. The paper includes an optimal approach for secure data processing by using SBoxes and variable key length. The simulation results are obtained by using Matlab 7.3.
منابع مشابه
Evolutionary Computing Assisted Wireless Sensor Network Mining for QoS-Centric and Energy-efficient Routing Protocol
The exponential rise in wireless communication demands and allied applications have revitalized academia-industries to develop more efficient routing protocols. Wireless Sensor Network (WSN) being battery operated network, it often undergoes node death-causing pre-ma...
متن کاملQuantum Phase Shift For Energy Conserved Secured Data Communication In Manet
A Mobile Ad-Hoc Network(MANET) is a structure-less network where the mobile nodes randomly moved in any direction within the transmission range of the network. Due to this mobility, wide range of intrusion occurs in MANET. Therefore, Intrusion Detection Systems (IDS) are significant in MANETs to identify the malicious behavior. In order to improve the secured data communication an efficient Qua...
متن کاملEnergy Efficient Cluster based Key Management & Authentication Technique for Wireless Sensor Networks
In wireless sensor networks, the security attacks are due to the compromise of the large part of the network which can cause node damage or disturbance in the data flow. At the time of re-keying process, if the re-key from the sink is not securely transmitted to the compromised node, it will lead to denial of service attack. In this paper, we propose a cluster based key management technique for...
متن کاملNew Enhanced Security For Data Transmission Across Mobile Adhoc Network
The Communication systems are typical data systems, which can be undetermined by unauthorized users who have illegal access to the systems. Main Problem created in attacking to malicious node and group of network, whole traffic by system break, data loss, data affecting and data failure system. Overcome node Proposed scheme uses a role-based access control frame work, MANET concept working algo...
متن کاملA Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks
Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...
متن کامل