Efficient Key Mechanisms in Multi-node Network for Secured Data Transmission

نویسنده

  • Ajay Kakkar
چکیده

*Thapar University, Patiala, India **GNDU, Amritsar, India Ex-Principal, MIMIT, Malout, India Abstract: Cryptography is a technique used to avoid unauthorized access of data. It is the technique of scrambling data to make it indecipherable to all, except the intended person. It includes encryption algorithm and reliable key(s). It is clear that key design flaws account for 50 percent of security problems, and architectural risk analysis plays an important role in any solid security program. The importance of key management has been profound, since most attacks to encryption algorithm are based on vulnerabilities caused by poorly designed and developed key management. The strength of the model depends upon the key length. Keys having short lengths are not suitable for secure transmission in multinode network (MN) because they results in more hacking time. If large key lengths are used then they leads to more processing time. Therefore it is highly required to frame a model which provides the flexibility to the user to select the keys having variable lengths. The main highlight of the work is to reduce the time available to the hacker by using S-Boxes and variable key lengths. The paper includes an optimal approach for secure data processing by using SBoxes and variable key length. The simulation results are obtained by using Matlab 7.3.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evolutionary Computing Assisted Wireless Sensor Network Mining for QoS-Centric and Energy-efficient Routing Protocol

The exponential rise in wireless communication demands and allied applications have revitalized academia-industries to develop more efficient routing protocols. Wireless Sensor Network (WSN) being battery operated network, it often undergoes node death-causing pre-ma...

متن کامل

Quantum Phase Shift For Energy Conserved Secured Data Communication In Manet

A Mobile Ad-Hoc Network(MANET) is a structure-less network where the mobile nodes randomly moved in any direction within the transmission range of the network. Due to this mobility, wide range of intrusion occurs in MANET. Therefore, Intrusion Detection Systems (IDS) are significant in MANETs to identify the malicious behavior. In order to improve the secured data communication an efficient Qua...

متن کامل

Energy Efficient Cluster based Key Management & Authentication Technique for Wireless Sensor Networks

In wireless sensor networks, the security attacks are due to the compromise of the large part of the network which can cause node damage or disturbance in the data flow. At the time of re-keying process, if the re-key from the sink is not securely transmitted to the compromised node, it will lead to denial of service attack. In this paper, we propose a cluster based key management technique for...

متن کامل

New Enhanced Security For Data Transmission Across Mobile Adhoc Network

The Communication systems are typical data systems, which can be undetermined by unauthorized users who have illegal access to the systems. Main Problem created in attacking to malicious node and group of network, whole traffic by system break, data loss, data affecting and data failure system. Overcome node Proposed scheme uses a role-based access control frame work, MANET concept working algo...

متن کامل

A Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks

Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010