Routine of Encryption in Cognitive Radio Network

Abstract

Today data transmission is very important through different channels. Need of network security comes to secure data transformation from one network to another network. As the complexity of the systems and the networks increases, weakness expands and the task of securing the networks is becomes more convoluted. Duty of securing is done by Cryptography techniques. A colossal amount of data is exchanged over public networks like the internet due to immense accommodation. This includes personal details and confidential information. It is important to prevent the data from falling into the wrong hands. So, due to this factor we use cryptography. Encryption and decryption are the basic terms that are used in cryptography. There are few algorithms which used including, AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES (Triple Data Encryption Standard) and BLOWFISH. The main contribution of this paper is to provide an algorithm that is useful for data transformation in cognitive radio networks. In this research, we have drawn a new symmetric key technique that is for the usage of cryptography which is helpful to make the data saved from others.

Authors and Affiliations

A. Raza, M. T. Meeran, M. din

Keywords

Related Articles

Socio-Cultural Value of Public Open Spaces with Hamchas in Dera Ghazi Khan City, Pakistan

The socio-cultural value of open spaces normally refers to the behavior of users towards their surroundings. In the city of DGK (Dera Ghazi Khan), the wooden cots (locally known as Hamachas) are placed at almost every ch...

De-Centralized Multi Robot Co-Ordination and Communication

The aim of this research is to develop a decentralized communication system of multiple robots which have capability to communicate and coordinate with each other, by which all robots work individually while keeping conn...

Introducing Team Coordination Framework to Support Globally Distributed Teams for Pakistani Software Industry

Collaborative effort is required in DSD (Distributed Software Development) in order to develop software in manageable components. Immense effort is taking place due to the cultural, geographical and temporal distances am...

Reduction of Cracking and Shrinkage in Compressed Clay Beams during Drying

Uncontrolled evaporation of moisture from compressed clay beams can cause surface cracks, resulting in reduction of strength. This paper presents various treatments applied to clay beams during the process of casting, co...

An Intelligent Vehicular Traffic Signal Control System with State Flow Chart Design and FPGA Prototyping

The problem of vehicular traffic congestion is a persistent constraint in the socio-economic development of Pakistan. This paper presents design and implementation of an intelligent traffic controller based on FPGA (Fiel...

Download PDF file
  • EP ID EP616463
  • DOI 10.22581/muet1982.1903.07
  • Views 91
  • Downloads 0

How To Cite

A. Raza, M. T. Meeran, M. din (2019). Routine of Encryption in Cognitive Radio Network. Mehran University Research Journal of Engineering and Technology, 38(3), 609-618. https://europub.co.uk/articles/-A-616463