Message Authentication in wireless Networks using HMAC algorithm.
Journal Title: International Journal of engineering Research and Applications - Year 2018, Vol 8, Issue 5
Abstract
A message is to be transferred from one network to another across some sort of internet. To do this a logical information channel should established by defining a route through the internet from source to destination with the help of some protocols. A security-related transformation on the information to be sent, with some secret information as secret key will be shared by the two networks and, it is hoped, unknown to the opponent. Wireless networks are increasingly being used in the network with limited cost and low equipment requirement. However, the growing popularity and widespread applications of wireless networks are directly proportionate to their security exploitation. The strength of its infrastructure also becomes the point of its greatest availability in the network. Thus decreasing the confidence level of the system as it pertains to availability, reliability, data integrity and privacy concerns. Message authentication is used to protecting the integrity of a message and validating identity of originator. The algorithm used in this paper for authenticating messages is Hash Message Authentication Codes (HMAC) with stream ciphering.
Authors and Affiliations
Mr. Tadesse Hailu Ayane, Mr. Temesgen Bailie Workie, Mr. G. Subba Rao, Lecturer .
Optimization of Minimum Quantity Lubricant (MQL) Conditions in Milling of mild Steel
Minimum quantity lubrication (MQL) has been well established as an alternative to flood coolant processing. The optimization of MQL conditions is reducing the machining cost and improving the performance. In this study,...
Numerical Investigations on Aerodynamic Characteristics of Savonius Wind Turbine
In This Paper Objective Is To Investigate The Aerodynamic Performance Of Savonius Wind Turbine. Wind Tunnel Investigation Was Carried Out To Find The Aerodynamic Characteristics Like, Drag Coefficient, Torque Coefficient...
Flow Development through a Duct and a Diffuser Using CFD
In the present paper an extensive study of rectangular cross-sectioned C-duct and C-diffuser is made by the help of 2-D mean velocity contours. Study of flow characteristics through constant area duct is a fundamental re...
Analysis of Pseudo-range Measurements Observed in NavIC Receiver
The Indian Regional Navigation Satellite System (IRNSS), also known as NavIC- Navigation with Indian Constellation provides real time positioning and timing services. The NavIC receivers are placed in different regions....
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
In recent years,increment in the growth and popularity of cloud services has lead the enterprises to an increase in the capability to handle, store and retrieve critical data. This technology access a shared group of con...