A Review on Various Data Security Techniques in Wireless Communication System
نویسندگان
چکیده
The data transfer, either through wired media or wireless media, needs privacy or a security. In case of wireless means of communication when the data is in the route, in order to protect the data from going into the hands of an unauthorized person, the two main techniques are used i.e. Steganography and Cryptography. Steganography hides the messages inside other harmless digital media without altering it such that no one can detect the presence of secret message whereas cryptography is the science of writing the secret message and the science of encryption and decryption. Basically Cryptography may be public key cryptography also called asymmetric where different keys are used for encryption and decryption or the private key processes or it may be the private key cryptography also called symmetric which uses the same key for both the encryption and decryption processes. Symmetric cryptographic algorithms operating on single bit at a time are said to be stream ciphers and those operating on data in groups or blocks are said to be symmetric block ciphers. This paper aims at the study of various symmetric block ciphers like Data Encryption Standards (DES), Triple-Data Encryption Standards (T-DES) And Advanced Encryption Standards (AES). Also this paper compares the various encryption and decryption algorithms used in Data Encryption Standards (DES) and Advanced Encryption Standards (AES) which may be implemented in various hardwares like ASICs and FPGA. Field Programmable Gate Arrays are the digital Integrated Circuits which can be reconfigured are widely used to provide the high performance and the low cost application for the purpose of performing cryptographic applications.
منابع مشابه
Emerging Optical CDMA Techniques and Applications
In this paper we present an in-depth review on the trends and the directions taken by the researchers worldwide in Optical Code Division Multiple Access (OCDMA) systems. We highlight those trends and features that are believed to be essential to the successful introduction of various OCDMA techniques in communication systems and data networks in near future. In particular we begin by giving a c...
متن کاملRouting Hole Handling Techniques for Wireless Sensor Networks: A Review
A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensi...
متن کاملSTCS-GAF: Spatio-Temporal Compressive Sensing in Wireless Sensor Networks- A GAF-Based Approach
Routing and data aggregation are two important techniques for reducing communication cost of wireless sensor networks (WSNs). To minimize communication cost, routing methods can be merged with data aggregation techniques. Compressive sensing (CS) is one of the effective techniques for aggregating network data, which can reduce the cost of communication by reducing the amount of routed data to t...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملA survey on the wi-fi wireless network systems penetration approaches
Wireless network technology made it possible to communicate easily using the electromagnetic waves leading to removing the biggest barrier in portable communications. As these networks use the air as the communication medium which leads to face with more vulnerabilities. Wireless networks play a vital role in our life in a way that all devices ranging from local modems to organizational equipme...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013