Message Authentication in wireless Networks using HMAC algorithm.
Journal Title: International Journal of engineering Research and Applications - Year 2018, Vol 8, Issue 5
Abstract
A message is to be transferred from one network to another across some sort of internet. To do this a logical information channel should established by defining a route through the internet from source to destination with the help of some protocols. A security-related transformation on the information to be sent, with some secret information as secret key will be shared by the two networks and, it is hoped, unknown to the opponent. Wireless networks are increasingly being used in the network with limited cost and low equipment requirement. However, the growing popularity and widespread applications of wireless networks are directly proportionate to their security exploitation. The strength of its infrastructure also becomes the point of its greatest availability in the network. Thus decreasing the confidence level of the system as it pertains to availability, reliability, data integrity and privacy concerns. Message authentication is used to protecting the integrity of a message and validating identity of originator. The algorithm used in this paper for authenticating messages is Hash Message Authentication Codes (HMAC) with stream ciphering.
Authors and Affiliations
Mr. Tadesse Hailu Ayane, Mr. Temesgen Bailie Workie, Mr. G. Subba Rao, Lecturer .
Optimization of Convective Heat Transfer Model of Cold Storage with Cylindrical Pin Finned Evaporator Using Taguchi Analysis
This work contains of design of experiments to optimize the various control factors of a cold storage evaporator space inside the cold room, in other words the heat absorption by evaporator will be maximize to minimize t...
Diabetes Prediction Using Machine Learning Techniques
Diabetes is a chronic disease with the potential to cause a worldwide health care crisis. According to International Diabetes Federation 382 million people are living with diabetes across the whole world. By 2035, this w...
Drought Vulnerability Detection And Mapping In Thrissur District, A Part Of Southern Western Ghats, India- Using Geoinformatics
Drought is an insidious phenomenon. Unlike rapid onset disasters, it tightens its grip over time, gradually destroying an area. In most cases, drought can last for many years .The impacts of drought vary from lack of ade...
A Singular Spectrum Analysis Technique to Electricity Consumption Forecasting
Singular Spectrum Analysis (SSA) is a relatively new and powerful nonparametric tool for analyzing and forecasting economic data. SSA is capable of decomposing the main time series into independent components like trends...
Optimal Unified Power Quality Conditioner Allocation in Distribution Systems for Loss Minimization using Grey Wolf Optimization
Compensation in power systems is essential to reduce the power loss and maintain the voltage profile. Reactive power compensation and voltage compensation are the different compensation techniques available in power syst...