NETWORK LAYER SECRECY PERFORMANCE OF THE FORWARDING FUNCTIONALITY USING DSA GENERATION

Abstract

 A full duplex system with sources, relay and destination nodes for secrecy communication in the presence of an eavesdropper is investigated. Using geometrical perspective the secrecy region of secrecy performance will be evaluated. Degradation of the detection performance for legitimate receiver is carried out. We consider the generation of a secret key (SK) by the inputs and the channel. Encryption is attained using the RC4 algorithm which generates the hash code. Source can decide the duplex. If the specified network is half duplex then the process will be one way communication otherwise it will be two way communication. Physical layer is the full duplex and half duplex relay network of the system performance. Full duplex process is accomplished by CSMA/CD. A full duplex system with sources, relay and destination nodes for secrecy communication in the presence of an eavesdropper is investigated. Using geometrical perspective the secrecy region of secrecy performance will be evaluated. Degradation of the detection performance for legitimate receiver is carried out. We consider the generation of a secret key (SK) by the inputs and the channel. Encryption is attained using the RC4 algorithm which generates the hash code. Source can decide the duplex. If the specified network is half duplex then the process will be one way communication otherwise it will be two way communication. Physical layer is the full duplex and half duplex relay network of the system performance. Full duplex process is accomplished by CSMA/CD.

Authors and Affiliations

Sandhya. V

Keywords

Related Articles

 PERFORMANCE ANALYSIS OF SISO AND MIMO SYSTEM ON IMAGE TRANSMISSION USING CANNY EDGE DETECTION

 This paper deals with the comparative performance analysis of transmission technique (SISO AND MIMO) and shows the effect on transmission of image. We used four techniques for this category; SISO with Canny edge d...

 A Robust Weber’s Local Descriptor for Copy Control

 Simple and robust local powerful descriptor called Weber Local Descriptor (WLD), which is put forward for detecting duplicated videos. Matching based on orthogonal moments has high computational complexity, espec...

 Novel Algorithm for Iris Biometrics Using Fast Wavelet Transforms

 Iris recognition is a potential tool in secure personal identification and authentication system which has the properties such as uniqueness, non-invasiveness and stability of human iris patterns. The method propo...

 A REVIEW ON A NOISE REDUCTION SYSTEM IN IC ENGINE

 The study focused on practical methods of reducing noise levels in automobile engine. Noise reduction is one of the highest prior targets for IC engine development because of the more and more strict engine noise...

 THE PREDICTION OF WATER CUTTING AND DENSITY OF OILWATERCONDENSAT MIXES

 This article is devoted to studying of problems, existence of a significant amount of gas-condensate deposits of Azerbaijan causes high prospects of use of condensate also as a thinner at pipeline transport hi...

Download PDF file
  • EP ID EP101372
  • DOI 10.5281/zenodo.47505
  • Views 84
  • Downloads 0

How To Cite

Sandhya. V (30).  NETWORK LAYER SECRECY PERFORMANCE OF THE FORWARDING FUNCTIONALITY USING DSA GENERATION. International Journal of Engineering Sciences & Research Technology, 5(3), 379-383. https://europub.co.uk/articles/-A-101372