Routine of Encryption in Cognitive Radio Network

Abstract

Today data transmission is very important through different channels. Need of network security comes to secure data transformation from one network to another network. As the complexity of the systems and the networks increases, weakness expands and the task of securing the networks is becomes more convoluted. Duty of securing is done by Cryptography techniques. A colossal amount of data is exchanged over public networks like the internet due to immense accommodation. This includes personal details and confidential information. It is important to prevent the data from falling into the wrong hands. So, due to this factor we use cryptography. Encryption and decryption are the basic terms that are used in cryptography. There are few algorithms which used including, AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES (Triple Data Encryption Standard) and BLOWFISH. The main contribution of this paper is to provide an algorithm that is useful for data transformation in cognitive radio networks. In this research, we have drawn a new symmetric key technique that is for the usage of cryptography which is helpful to make the data saved from others.

Authors and Affiliations

A. Raza, M. T. Meeran, M. din

Keywords

Related Articles

Effect of Steel Fibers on Heat of Hydration and Mechanical Properties of Concrete Containing Fly Ash

This study investigated the effects of steel fibers on the fresh and hardened properties, and heat of hydration of concrete containing FA (Fly Ash). A total of 192 samples were cast comprising cubes, cylinders, and prism...

Impact of TQM and Technology Management on Organizational Performance

In the growing business competitiveness TQM (Total Quality Management) and TM (Technology Management) practices have become important for organizational success. TQM fosters business excellence while TM helps to deal wit...

A Novel Parallel Algorithm for Edit Distance Computation

The edit distance between two sequences is the minimum number of weighted transformation-operations that are required to transform one string into the other. The weighted transformation-operations are insert, remove, and...

Relative Efficiency of Different Tillage Practices and Their Effect on Soil Physical Properties under Semi-Arid Climate of Tandojam, Pakistan

Tillage practices affect physical properties of soil that are crucial for better crop production. The study was carried out to compare the efficiency of two different tillage implements and their effect on some soil phys...

Factors Causing Health and Safety Hazards in Construction Projects in Pakistan

In spite of technical advancements, construction industry in developing countries, including Pakistan, heavily relies upon manual labor and orthodox methods of construction. Such practices then give rise to safety issues...

Download PDF file
  • EP ID EP616463
  • DOI 10.22581/muet1982.1903.07
  • Views 116
  • Downloads 0

How To Cite

A. Raza, M. T. Meeran, M. din (2019). Routine of Encryption in Cognitive Radio Network. Mehran University Research Journal of Engineering and Technology, 38(3), 609-618. https://europub.co.uk/articles/-A-616463