Open Access Open Access  Restricted Access Subscription or Fee Access

Multilayer Data Security Model for Handheld Devices with Simple Encryption Technique and Hardware Software Co-Design

J.D. Ansilla Bensam, Dr. N. Vasudevan, Dr. S. Ravi

Abstract


Data transmission increases vastly and hence the crisis in data security arises. The transmitted data are subjected to various proceedings to ensure security. From the usual way of providing security in the presentation layer alone, it is strongly put forth to provide security in the other layers too. This could be done with the help of the Software Hardware co-design. Apart from the Encryption Techniques, small mechanism to screen the trusted users is provided in the Physical layer itself to enrich the strength of the security. Comparison is done with strong encryption and combined weak encryption and hardware technique.

Keywords


Data Encryption, Data Security, Embedded Mote, Hardware Software Co-design.

Full Text:

PDF

References


Accigmez. O, pierre Seifert. J and Koc. C. K, „Predicting Secret Keysvia Branch Prediction‟, In Cryptology, The Cryptographers Track at RSA ,Springer-Verlag, pp. 225-242, 2007.

Chun-Yuah Chiu, E.H.Wu and Gen-Huey Chen, „AReliable and Efficient MAC layer Broadcast (Multicast)Protocol for Mobile Ad hoc Networks‟, inGlobal Internet and Next Generation Networks,GlobeCom 2004, pp. 2802– 2807, December2004.

DiaaSalama Abdul Elminaam, HatemAbdulKader and Mohie Mohamed Hadhoud, „Performance Evaluation of Symmetric EncryptionAlgorithms‟, International Journal of ComputerScience and Network Security, vol.8 no.12, pp.280-286, December 2008.

Diaa Salama Abdul, Elminaam, Hatem. M, Abdul Kader and Mohie M., Hadhoud, “Encryption Algorithms on Power Consumption for Wireless Devices”, International Journal of Computer Theory and Engineering, Vol. 1, No. 4, October, 2009.

Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader Mohiy Mohamed Hadhoud “Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Diferent Data Types”, International Journal of Network Security, Vol.11, No.2, pp. 78–87, 2010.

Elminaam, Abd. D. S, Kader H. M, Abdual and Hadhoud, Mohamed. M, „Evaluating the Performance of Symmetric Encryption Algorithms‟, International Journal of Network Security, vol. 10, no. 3, pp. 216-222, May 2010.

Gentian Jakllari, WenjieLuo and Srikanth Krishnamurthy. V, „An Integrated Neighbor Discovery and MAC Protocol for AdHoc Networks Using Directional Antennas‟, IEEE Transactions On Wireless Communications, vol. 6, no. 3, March 2007.

Gollakota. S and Katabi. D, „Zigzag decoding: Combating hidden terminals in wireless networks‟, in Proceedings of the ACM SIGCOMM Conference, 2008.

Gohil Rikitaben Karsanbha, Mary Grace Shajan, “AES Algorithm for Secured Wireless Communication”, National Conference on Recent Trends in Engineering & Technology, 13-14 May 2011.

Heinzelman, Chandrakasan. W. R, AandBalakrishnan. H, „Energy- efficient communication protocol for wireless microsensor networks‟, in Proceedings of the 33rdHawaii International Conference on System Sciences, Maui, Hawaii, 2000.

Jain. S and Das. S, „Exploiting Path Diversity in the Link Layer in Wireless Ad hoc Networks‟, In Proceedings of World of Wireless, Multimedia and Mobile networks, WoWMoM 2005.

Kaynia. M, Øien. G. E, Jindal. N , and Gesbert. D, „Comparative performance evaluation of MAC protocols in adhoc networks with bandwidth partitioning‟, in proceeding, IEEE International Symposium on Personal, Indoor and Mobile Radio Communication (PIMRC), pp. 1–6, Sep. 2008.

Mariam Kaynia, Nihar Jindal and Geir Øien. E, „Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design‟, IEEE Transactions On Wireless Communications, vol. 10, no. 1, January 2011.

McKay. K, „'Trade-offs Between Energy and Security in Wireless Networks Thesis‟, Worcester Polytechnic Institute, 2005.

Min-Te Sun, Lifei Huang and Arora. A and Ten-Hwang Lai, „Reliable MAC Layer Multicast in IEEE 802.11 Wireless Networks‟, in Parallel Processing, International Conference on, Aug 2002.

Nadeem, Aamer, „A Performance Comparison of Data EncryptionAlgorithms‟, IEEE 2005.

Nadeem and Javed. M. Y, „A performance comparison of data encryption algorithms‟, Information and Communication Technologies,ICICT‟05, pp.84-89, 2005.

Nicholas Nethercote and Julian Seward, „How to shadow every byte of memory used by a program‟, in Proceedings of the 3rdinternational conference on Virtual execution environments, VEE '07, pp. 65-74, New York, USA, ACM, 2007.

Patwardhan. A,Parkar. J, Johi. A, Karyygiannis. A and Iorga. M, „Secure routing and Intrusion Detection in Ad-hoc Networks‟, Third International conference on Pervasive computing and communications, 2005.

Rafsanjani. M. K, Movaghar. A, „Identifying monitoring nodes with selection of Authorized nodes in mobile Adhoc network‟,World Applied Sciences Journal,vol. 4,no.3, pp.444-449,2008.

Rajender Singh, Rahul Misra, Vikas Kumar, “Analysis the Impact of Symmetric Cryptographic Algorithms on Power Consumption For Various Data Types”, International Journal on Recent and Innovation Trends in Computing and Communication, Vol.1, Issue 4, pp. 321-326, 2013.

Shivashankar, B.Sivakumar, G.Varaprasad, „Identification of Critical Node for the Efficient Performance in Manet‟, International Journal of Advanced Computer Science and Applications (IJACSA),vol.3, no.1, 2012.

Tang. k and Gerla. M, „MAC Layer Broadcast Support in 802.11 Wireless Networks‟, Proceeding, IEEE MILCOM, pp. 544-548, Oct. 2000.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.