Secure and Efficient Data Transmission for Cluster-based Wireless Technology Networks
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 7
Abstract
Secure data transmission network is a decisive issue for wireless technology networks (WTNs). Clustering is an effective and practical way to enhance the system performance & methods of WTNs. In this respective paper, we study a secure data transmitted for cluster-based method of WTNs (CWTNs), where the clusters are formed dynamically and periodically. We propose two Secure and Efficient data Transmission (SET) protocols for CWTNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, respectively. In SET-IBS, security relies on the hardness of the Diffie-Hellman problem in the pairing domain. SET-IBOOS further reduces the computational overhead for protocol security, which is crucial for WTNs, while its security relies on the hardness of the discrete logarithm problem. We show the feasibility of the SET-IBS and SET-IBOOS protocols with respect to the security requirements and security analysis against various attacks. The results show that, the proposed protocols have better performance than the existing secure protocols for CWTNs, in terms of security performance overhead and energy consumption.
Authors and Affiliations
Mohd Yousuf
FPGA Implementation of NOR Flash Storage Controller
Flash storage memory devices are Nand and NOR types which are widely used in data storage application in computers and solid states drives. Flash are nonvolatile and electrically erased and reprogrammed. A flash m...
Power Efficient Viterbi Decoder
Error correction is an integral part of any communication system and for this purpose, the convolution codes are widely used as forward error correction codes and for their decoding at the receiver end viterbi decoders...
Analyzing the Performance I-TCP and TCP with Explicit Lose Notification over Wireless Links for the Purpose of Further Improvement
Many researchers have been proposed different enhancements over wireless network for the Purpose of Further Improvement .in this research we do comparative study on the performance of the standard TCP over two ot...
MOSAICING IN VARIOUS IMAGES: A SURVEY
K-means clustering and watershed are the key techniques used as a combination, Edge detection procedure and region, merging are also used. Merging method based on mean gray values and edge strengths (T1, T2) are u...
An Automated Recognition of Fake or Destroyed Indian Currency Notes Using Image Processing
In India Every year RBI (Reserve bank of India) face the problem on counterfeit currency notes. The bank staffs are specially trained to detect counterfeit notes but problem begins once such notes are mixed into t...