Routine of Encryption in Cognitive Radio Network

Abstract

Today data transmission is very important through different channels. Need of network security comes to secure data transformation from one network to another network. As the complexity of the systems and the networks increases, weakness expands and the task of securing the networks is becomes more convoluted. Duty of securing is done by Cryptography techniques. A colossal amount of data is exchanged over public networks like the internet due to immense accommodation. This includes personal details and confidential information. It is important to prevent the data from falling into the wrong hands. So, due to this factor we use cryptography. Encryption and decryption are the basic terms that are used in cryptography. There are few algorithms which used including, AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES (Triple Data Encryption Standard) and BLOWFISH. The main contribution of this paper is to provide an algorithm that is useful for data transformation in cognitive radio networks. In this research, we have drawn a new symmetric key technique that is for the usage of cryptography which is helpful to make the data saved from others.

Authors and Affiliations

A. Raza, M. T. Meeran, M. din

Keywords

Related Articles

Effect of Compaction on Compressive Strength of Unfired Clay Blocks

This study investigates the possible use of unfired compacted clay blocks as a substitute of CSEB (Compressed Stabilized Earth Blocks) for the construction of economical houses. Cubes of 150 mm size were cut from the cla...

Effect of Intercritical Heat Treatment on Mechanical Properties of Reinforcing Steel Bars

Intercritical heat treatments attempts were made to enhance the mechanical properties of reinforcing steel bars milled from scrap metal. For this, two grades of steel bars were obtained from different steel mills and the...

Measuring the Role of Trust in M-Commerce Acceptance: An Empirical Analysis in Context of Pakistan

With the emergence of internet and WWW (World Wide Web), traditional businesses got a new opportunity to compete globally. A new term of M-Commerce (Mobile Commerce) emerged and set a new trend in commerce and business....

Comparative Study of Solar Inactivation of Total Coliforms through Transparent Plastic Bottles and Fabricated Disinfection Setup

The water is disinfected through different techniques commonly used at domestic level, including boiling, chlorination, UV (Ultraviolet) disinfection, etc. These methods require extensive amount of chemicals, energy and...

Computer Aided Design of a Low-Cost Painting Robot

The application of robots or robotic systems for painting parts is becoming increasingly conventional; to improve reliability, productivity, consistency and to decrease waste. However, in Pakistan only highend Industries...

Download PDF file
  • EP ID EP616463
  • DOI 10.22581/muet1982.1903.07
  • Views 122
  • Downloads 0

How To Cite

A. Raza, M. T. Meeran, M. din (2019). Routine of Encryption in Cognitive Radio Network. Mehran University Research Journal of Engineering and Technology, 38(3), 609-618. https://europub.co.uk/articles/-A-616463