NETWORK LAYER SECRECY PERFORMANCE OF THE FORWARDING FUNCTIONALITY USING DSA GENERATION

Abstract

 A full duplex system with sources, relay and destination nodes for secrecy communication in the presence of an eavesdropper is investigated. Using geometrical perspective the secrecy region of secrecy performance will be evaluated. Degradation of the detection performance for legitimate receiver is carried out. We consider the generation of a secret key (SK) by the inputs and the channel. Encryption is attained using the RC4 algorithm which generates the hash code. Source can decide the duplex. If the specified network is half duplex then the process will be one way communication otherwise it will be two way communication. Physical layer is the full duplex and half duplex relay network of the system performance. Full duplex process is accomplished by CSMA/CD. A full duplex system with sources, relay and destination nodes for secrecy communication in the presence of an eavesdropper is investigated. Using geometrical perspective the secrecy region of secrecy performance will be evaluated. Degradation of the detection performance for legitimate receiver is carried out. We consider the generation of a secret key (SK) by the inputs and the channel. Encryption is attained using the RC4 algorithm which generates the hash code. Source can decide the duplex. If the specified network is half duplex then the process will be one way communication otherwise it will be two way communication. Physical layer is the full duplex and half duplex relay network of the system performance. Full duplex process is accomplished by CSMA/CD.

Authors and Affiliations

Sandhya. V

Keywords

Related Articles

IMPLEMENTATION OF VEHICLE OVER SPEED VIOLATION INDICATOR AND IR BASED HORN SYSTEM

In the present day scenario traffic rules are frequently violated by the drivers and over speeding occur d ue to bad driving behavior ’s . So driver assistance system is p rovided to prevent over speed , violati...

 HECC-CHAP BASED PRIVACY PRESERVATION IN DISTRIBUTED INFORMATION SHARING

 Dept. of computer Science Security is an important issue during the transmission of data. Privacy Preservation enables various users to send their data to the server privately so that the external users can’t acce...

 EFFECT OF DIFFERENT TOOL PIN PROFILE ON THE MECHANICAL PROPERTIES OF MAGNESIUM BASED ALLOY AZ91 BY FRICTION STIR WELDING

The usage of magnesium in automotive applications is also assessed for the impact on environmental conservation. Recent developments in coating and alloying of Mg improved the creep and corrosion resistance properties o...

 Tertiary Treatment for Textile Waste Water-A Review

 Tertiary treatment is the Industrial waste water treatment process which removes stubborn contaminants that have not been removed in secondary treatment. Effluent becomes even cleaner by Tertiary treatment through...

AN AD HOC LEACH PROTOCOL WITH COMPACT DATA REDUNDANCY FOR WIRELESS SENSOR NETWORKS

WSN is a set of connected tiny devices (sensor nodes) with limited energy resource. WSNs have ability to extract the information from the harsh and hostile environment without human interaction. Once, WSN is deployed, i...

Download PDF file
  • EP ID EP101372
  • DOI 10.5281/zenodo.47505
  • Views 94
  • Downloads 0

How To Cite

Sandhya. V (30).  NETWORK LAYER SECRECY PERFORMANCE OF THE FORWARDING FUNCTIONALITY USING DSA GENERATION. International Journal of Engineering Sciences & Research Technology, 5(3), 379-383. https://europub.co.uk/articles/-A-101372