The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data Security is primary concern for every communication system. There are many ways to provide security data that is being communicated. However, security is assured irrespective of the hackers are from the noise. This Paper describes a design of effective security for data communication by implementing AES (Advanced Encryption Standard) algorithm for encryption and decryption.
Symmetric key algorithms are a typically efficient and fast cryptosystem, so it has significant applications in many realms. For a wireless ad hoc network with constraint computational resources, the cryptosystem based on symmetric key algorithms is extremely suitable for such an agile and dynamic environment, along with other security strategies. In this paper, we introduce the concept of selective...
Hacking is one of the greatest problems in the wireless local area networks. Many algorithms have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user safely and correctly. In this paper ,two type of Symmetric encryption algorithms introduced, they are 1. UMARAM 2. IMAkey Algorithm. These two algorithms a new symmetrical encryption algorithm is...
Recently, wireless communication has been popularly used in our everyday life. However, its security is a crucial challenge since wireless messages are broadcasted in the air through which hackers can intercept the massages and realize what the contents of the messages are. That is why security has been one of the most important issues in wireless communication studies. Encrypting messages to ciphertexts...
Nowadays, short message service (SMS) is faced with various security threats. Thus, the fields of high confidentiality(e.g., mobile E-commerce) require a higher level of security protection on SMS. Secure communication in incredible mobile network has very important significance. This paper presents a high security communication protocol for SMS. Through authentication, decryption and integrity protection,...
Modern wireless communication system based on wireless sensor network is strictly depends on medium access mechanism to improve its performance. CSMA is modifying here in its CSMA/CA format and trying to enhancing its performance same as CSMA/CD has for wired network. The aim of the paper is to inform how optimization of CSMA based sensor network is possible and how we can deploy it for monitoring...
This paper introduces a new (t, n) secret sharing scheme for image encryption. The proposed method encrypts the secret image into two images as the same size of the original image, which one is the public image (called the encrypted image) and another is to be shared among n participants using a new secret sharing method based on the Shamir’s secret sharing. In the new secret sharing scheme, t (or...
Radio frequency identification and detection (RFID) technology is a wireless communication technology that enables users to uniquely identify tagged objects or people. RFID is rapidly becoming a cost-effective technology. RFID can be supplied as read only or read/write, does not require contact or line of sight to operate, can function under a variety of environmental conditions, and provides a high...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.