Secure and Efficient Data Transmission for Cluster-based Wireless Technology Networks
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 7
Abstract
Secure data transmission network is a decisive issue for wireless technology networks (WTNs). Clustering is an effective and practical way to enhance the system performance & methods of WTNs. In this respective paper, we study a secure data transmitted for cluster-based method of WTNs (CWTNs), where the clusters are formed dynamically and periodically. We propose two Secure and Efficient data Transmission (SET) protocols for CWTNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, respectively. In SET-IBS, security relies on the hardness of the Diffie-Hellman problem in the pairing domain. SET-IBOOS further reduces the computational overhead for protocol security, which is crucial for WTNs, while its security relies on the hardness of the discrete logarithm problem. We show the feasibility of the SET-IBS and SET-IBOOS protocols with respect to the security requirements and security analysis against various attacks. The results show that, the proposed protocols have better performance than the existing secure protocols for CWTNs, in terms of security performance overhead and energy consumption.
Authors and Affiliations
Mohd Yousuf
COMPARITIVE STUDY OF VARIOUS DISTANCE MEASURES FOR ISOLATED SPEECH RECOGNITION APPLICATION
Speech recognition applications are becoming common these days as many of the modern devices designed are user - friendly for the convenience of general public. Speaking or communicating directly with the machine to a...
DETECTION OF BEARING FAULT USING VIBRATION ANALYSIS AND CONTROLLING THE VIBRATIONS
In today’s world we were more concerned with reducing the cost of failure and maintenance in any industry as per schedules of each machine and determined by the exact running condition of each major machinery comp...
TO ENCRYPT AND ENSURE THE QUALITY MEASURES OF ECG WATERMARKING USING WAVELET TRANSFORM
In recent years, internet revolution resulted in an explosive growth of multimedia applications. This rapid advancement of internet made it very easy to send data, the data may be of any form. If the data of Patie...
GAIT RECOGNITION USING THE METHOD OF 2-DPCA FEATURE EXTRACTION
Gait recognition is the main field of authentication system to identifying the person. Different person utilize different gait step on different situation depending on movements. Gate reorganization is done by usi...
ESTIMATION OF ROAD SURFACE ROUGHNESS CONDITION FROM ANDROID SMARTPHONE SENSORS
In day to day life transport to the desired location is the most common activity. Road plays vital role in the whole process of transportation. It is necessary that road condition should not be bad in any case for...