Secured Wireless Data Communication
نویسندگان
چکیده
Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of algorithms available for encryption and decryption of data and new algorithms are evolving. Polyalphabetic substitution cipher is a strong algorithm used for security of data in army stations. In this paper, various techniques of security of data and one the algorithm using polyalphabetic substitution cipher are discussed.
منابع مشابه
Proactive Bai’s Secret Sharing Scheme for AOMDV Routing Protocol for Secured Communication in MANET
-The amount of applications in Wireless networks is developing continuously. And hence the need for security in wireless communication is also developing constantly with the development of Wireless communication particularly in MANET. Security is of a great concern in the present wireless communication. It is essential to provide security to the network from the attackers and their security att...
متن کاملDesign of Secured and Efficient Wireless Sensor Network with Integration to Public Cloud for Big Data Analytics
This paper presents a design of secured and efficient Wireless Sensor Networks with integration to public cloud for big data analytics. Now-a-days sensors are widely used in day to day life. Sensors have some limitations in terms of memory, computation, storage, communication, energy. These are the area to deal with. Cloud computing is a promising technology, which provides massive storage, com...
متن کاملInformation theory and cryptography based secured communication scheme for cooperative MIMO communication in wireless sensor networks
Emerging cooperative MIMO communication is a promising technology in improving communication performance for wireless sensor networks. However, the security problems inherent to cooperative communications also arise. In this paper, we propose a cross-layer secured communication scheme for cooperative MIMO communication in wireless sensor networks to overcome the external and active compromised ...
متن کاملAn Energy-Efficient Key Management Scheme using Trust Model for Wireless Sensor Network
In wireless sensor networks (WSNs), secret shared keys must be established with the neighboring nodes in order to achieve secure communication. The challenge issues for secured communication in WSN are the Key management. Location Dependent Key (LDK) management is a suitable scheme when compared to other location based key management schemes because of lesser memory space requirement and lesser...
متن کاملEmergency TeleOrthoPaedics m-health system for wireless communication links
For the first time, a complete wireless and mobile emergency TeleOrthoPaedics system with field trials and expert opinion is presented. The system enables doctors in a remote area to obtain a second opinion from doctors in the hospital using secured wireless telecommunication networks. Doctors can exchange securely medical images and video as well as other important data, and thus perform remot...
متن کاملEnergy Efficient Cluster based Key Management & Authentication Technique for Wireless Sensor Networks
In wireless sensor networks, the security attacks are due to the compromise of the large part of the network which can cause node damage or disturbance in the data flow. At the time of re-keying process, if the re-key from the sink is not securely transmitted to the compromised node, it will lead to denial of service attack. In this paper, we propose a cluster based key management technique for...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015