SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 45
Secure communication for mobile Adhoc network using
(LPIT) Lagrange polynomial and Integral transform with
Exponential Function
Sumee Rai Nidhi Tyagi Pradeep Kumar
Student, CS Associate Professor, CS Assistant Professor, CS
Shobhit University, Shobhit University, JSSATE, UPTU
Meerut-250110 Meerut-250110 Noida-201301
Abstract—Mobile adhoc network is collection of autonomous nodes that are frequently moving without the centralized
control. Mobile adhoc networks are multi hop wireless networks without fixed infrastructure. Node frequently change
topology, due to this type of behavior transformation of information from one node to another node is more
complicated task. Decentralized nature of mobile adhoc network is more vulnerable to attack like denial of service
(DOS) which consumes more bandwidth and resources. Security is major concern in adhoc network, so in this paper,
we propose a new algorithm based on Lagrange polynomial and Laplace transform and inverse Laplace transform to
enhance secure communication for MANET. This proposed algorithm provides security for transmission of
information among node.
Keywords—Mobile adhoc network, Lagrange Interpolation, Threshold Cryptography, Modular Arithmetic, Integral
Transform
I. INTRODUCTION
Adhoc network is self-dependable infrastructure less network. Every node moves independently and communicates with
each other without the help of any central control. Connection among mobile nodes are made through waves, topology
changes dynamically during over all process of communication. Due to inherent characteristic of MANETs: open
medium, lack of centralized control, dynamic movement of node ,etc, MANETs are highly vulnerable to attacks.
Problem formulation: Main problem is highly secure communication among MANET node, so we proposed a secure
algorithm based on Lagrange Polynomial and Laplace Transform.
II. BACKGROUND
Threshold Cryptography is the way to enhance security by creating partial secret shares and distribute among a set of n
values based on node id. In a threshold cryptography scheme, out of n entities, we choose t (threshold value) entities
(t<n) and calculate secret information on the basis of polynomial function.
Quantum Cryptography (QC) depends on the uncertainty principle of quantum with which it is impossible to for
an eavesdropper to detect the data being transmitted without disturbing the transmission. This method is not based on
mathematics instead it is developed on the base of physics. The changes made by the eavesdropper will anonymously
introduce high error rate in the transmission between sender and receiver. It makes use of photons (light particles) to
generate keys. Provably secure key distribution is achieved by using two channels between sender and receiver. Public
and quantum channels are used to transmit encrypted data and key distribution respectively.
Integral transform has many applications in various fields such as Mechanics, Electrical circuit, Beam problems,
Heat conduction, Wave equation, Transmission lines, Signals and Systems, Control systems, Communication Systems,
Hydrodynamics, Solar systems. In this paper, we will discuss application of cryptography. In Shamir’s idea of identity-
based cryptosystem [3], the recipient’s identity i is used to generate the encryption key, and the decryption key is derived
from I and a random seed k. In an identity-based signature scheme, the signature key is generated from sender identity I
and a random seed k, and the verification key is derived from sender’s identity i.
Many IBC schemes [3,6] use threshold cryptography which originated from Shamir , for their key management.
Shamir gives a solution to the problem of sharing a secret among a number of users. In his paper, he identifies the
problem of how to divide data D into n pieces in such a way that D is easily reconstruct able from any t pieces, but even
complete knowledge of t − 1 pieces reveals absolutely no information about D.
In [8] a distributed pair wise key establishment scheme based on the concept of bivariate polynomials. In their
method, any mobile node in an ad hoc network can securely communicate with other nodes just by knowing their
corresponding IDs. The bivariate polynomials are shared in such a manner that the shares depend on the coefficient
matrix of the polynomial, the requesting node's ID and the ID of the nodes that respond to the request.
Identity-based cryptography specifies a cryptosystem in which both public and private keys are based on the
identities of the users.[3,6] The idea of IBC was first proposed by Shamir in 1984.[7] Such a scheme has the property that
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 46
a user’s public key is an easily calculated function of his identity, while a user’s private key can be calculated for him by
a trusted authority, called a Private Key Generator (PKG).Compared to traditional PKI, it saves storage and transmission
of public keys and certificates, which is especially attractive for devices forming MANETs. The identity based
cryptosystem [9] and shared the session key among the nodes of MANET. Identity based cryptosystem provides a new
but safe strategy for communication in MANET, Strategy uses Lagrange interpolation to share the session key among the
nodes of MANET. This paper realizes the safe communication in the MANET. Integral transformation based encryption
provide higher secure algorithm. In this process use Laplace and inverse Laplace transformation. Algorithm which makes
it suitable for embedded systems that require high performance; ease of implementation, high speed, low power
consumption and low cost beside security.
Proposed Security Architecture and Mechanism for wireless Information Transmission
The architecture and detailed mechanism is discussed in section discus below respectively.
III. SECURITY ARCHITECTURE
Figure illustrates the working architecture based on threshold cryptography, Lagrange polynomial and Integral
transformation. The proposed architecture is divided into modules like Generate session key using node id at both sender
and receiver side, encryption using Integral transformation and decryption done by inverse integral transformation
method using exponential function.
Fig. 1 Secure Architecture based on Threshold Cryptography
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 47
Fig. 1 Flow Chart for generating partial keys, Encryption and decryption
IV.KEY GENERATION, ENCRYPTION AND DECRYPTION
Step -1 Key Generation
In the first Module of key generation we explain about how we generate the session key by using threshold cryptography
and Lagrange interpolation with modularithmetic to generate session key required Minimum tTh (Threshold value) no of
node in cluster. Consider a Polynomial equation GF (p) is Finite field p>n
Choose a0, a 1 , a 2 , a k-1∈GF (p)
F(x) = (a0x0
+ a 1 x1
+ a 2 x 2
+ … ..............+ a t-1 x t-1
) mod p
F(0)= a0=secret key (SK) and p is a huge prime number and a1, a2…, and ak-1 are arbitrarily chosen from Z/PZ.
Then each user of identity id is provided with it partial key
Si = f (idi). Their shares provide t distinct points (x, y) = (i, Si) calculate polynomail by using lagrange interpolation [5]
( ) =	∑ ∏ , Eq-1
Lagrange interpolation Since f (0) = a0 = S, the shared secret can be expressed as
= 	
Where
=	
−
,
Secret key is genrated by t arbitary node(minimum no of threshold node) by using F(0)=a0modp=(SK)
Step-2 Encryption Process
Introduction to the Integral Transform Method
The foundation of Integral theory is Lerch's cancellation law. The direct Integral transform or the integral of a function
f (t) defined for 0≤t <∞ is the ordinary calculus integration problem
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 48
L{f(t)}= F(s)= ∫ f(t)e-st
dt
L-1
{F(S)}=f(t)
L-1
is inverse Integral transform.
Integral transformation is linear function that satisfies following
1. L{f(t) ±g(t)}= L{f(t)} ± L{g(t)}
2. L{d1f(t) = d1L{f(t)} d1 is constant.
There are many application of Laplace transform like to solve differential equation, in physics and engineering. In this
paper we use Laplace transformation to provide the security of information during transmission from one node to another
node in mobile Adhoc network inter and intra communication.
Using exponentail function
= 1 +
1!
+
( )
2!
+
( )
3!
+ ⋯,
k any real no.Multiply both sides by x
= (1 +
1!
+
( )
2!
+
( )
3!
+ ⋯ ),
k any real no.
= 1 +
1!
+
( )
2!
+
( )
3!
+ ⋯,
k is shared key generated by LaGrange polynomial.
Let us consider plain text
( ) = = 0 1 + 1
1!
+ 2
( )
2!
+ 3
( )
3!
+ 4
( )
3!
+ 5
( )
3!
…,
( ) = = ( 01 + 1
1!
+ 2
( )
2!
+ 3
( )
3!
+ 4
( )
3!
+ 5
( )
3!
… ),
( ) =∑ (∞
2n
xn+1
/ !)
Taking Integral transform both side
L ( )} = { } = { ( 01 + 1
!
+ 2
( )
!
+ 3
( )
!
+ 4
( )
!
+ 5
( )
!
… ), }
L{ ( )}= + + + + … … … … … … … … … ..																								
Modular Arithmetic
Modular Arithmetic discovered by K.F. Gauss. Two numbers a and b are said to be equal or congruent modulo n iff
n|(a-b), i.e. iff their difference is exactly divisible by n. Usually a, b, are nonnegative and n a positive integer.
We write a = b (mod n).
Ci=Gi mod26 for i=0, 1, 2, 3……………………n
Ci=Gi-26difor i=0, 1, 2, 3……………………n
All di for i=0, 1, 2, 3……………n Sharable between sender and receiver .
C0, C1 ,C2 , C3 , C4 ……..Cn are Cipher text of Plain text P0, P1 , P2 ,P3, P4…………….Pn
Step-3 Decryption Process
Gi=Ci+ 26difor i=0, 1, 2, 3……………………n using di generate all Gi
L{ ( )}= + + + +
Taking inverse Laplace transforms both sides
using LaGrange interpolation generate session key and generate P0, P1 , P2 ,P3, P4……….Pn
Mechanism for secure Information transmission
The proposed mechanism is divided into main three phases as follows.
PHASE-1: Secret Key Generation using LaGrange interpolation polynomial
 Random no generator generate node id.
 Using node id Generate shared information of secret key
A B C D - - Z
0 1 2 3 - - 25
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 49
 We fixed threshold no of node id ,to regenerate secret key
 Consider a Polynomial equation GF (p) is Finite field p>n
 Choose a0, a 1 , a 2 , a k-1∈GF (p)
g(x) = (a0x0
+ a 1 x1
+ a 2 x 2
+ … + a t-1 x t-1
) mod p
Total No of user=N;
for(i=0; i<t; i++)
{Id[i];
}
for(i=0; i<t; i++)
{ nr=1;
dr=1;
for(j=0; j<t; j++)
{
If(j≠i)
{
nr=nr*(x-Id[j]);
dr=dr*(Id[i])- Id[j]);
g(x)=(nr/dr)*FId[i])); /*Polynomial Equation generated by node id*/
}
Put the value of x and Generate Secrete KEY;
Sk=g(x)mod p; /*SK-Session Key*/
/*session key use for secure communication among nodes.*/
PHASE-2: Encryption
 Secret key generate from LaGrange polynomial use as key in Integral transform
 Generate secure message using Integral transform.
PHASE-3: Decryption
 Generate session key using shared partial information
 Decrypt message using inverse integral transformation.
EXAMPLE
Key Generation
Choose a0, a 1 , a 2 , a k-1∈GF (p)
F(x) = (a0x0
+ a 1 x1
+ a 2 x 2
+ … ..............+ a t-1 x t-1
) mod p
a0 =2, a1, a2=1 ,a3=1
let us consider node id generated by random no generator
consider 4 node
id0=0 id1=1,id2=2,id3=3 prime no p=5,
plynomail equation
f(x)=(x3+x2-x+2)mod5
generate partial key using lagrange polynomail
f(0)=2, f(1)=3, f(2)=12, f(3)=5, these partial key send to reciver side ,reciver generate session key using these partial key.
k=f(0)=2mod5=2
Encryption Process
Let us consider plain text
MONDAY
P0=12, P1=14,P2=15,P3=3,P4=0,P5=24
( ) = = 0 1 + 1
1!
+ 2
( )
2!
+ 3
( )
3!
+ 4
( )
3!
+ 5
( )
3!
…,
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 50
( ) = = ( 01 + 1
1!
+ 2
( )
2!
+ 3
( )
3!
+ 4
( )
3!
+ 5
( )
3!
… ),
for k=2
( ) = = (12 + 14
1!
+ 15
( )
2!
+ 3
( )
3!
+ 0
( )
4!
+ 24
( )
5!
… ),
by using Integral transformation ,taking Integral transform both side of give equation consider k generated by Lagrange
polynomial,
L{ ( )} = { } = { 12 + 14
!
+ 15
( )
!
+ 3
( )
!
+ 0
( )
!
+ 24
( )
!
… },
for k=2
L{ ( )} = { } = { 12 + 14 !
+ 15
( )
!
+ 3
( )
!
+ 0
( )
!
+ 24
( )
!
… },
taking Integral transform both side
= + + + + +
q0=12, q1=56,q2=120,q3=136,q4=0,q5=4608
12=26(0)+12, 56=26(2)+4, 120=26(4)+22, 136=26(6)+0 , 0=26(0)+0 , 4608=26(177)+4
C0=12, C1=4, C2=22 ,C3=0, C4=0 , C5=4 are cipher text
for i=0,1 2 , 3, 4 ,5 ,6 ………… di= 0, 2, 4, 6, 0, 177 shared between sender and receiver.
messages ‘MONDAY’ converted to ‘ MEWAAD’.
Decryption Process
1. using shared partial key generate secured key
f(0)=2, f(1)=3, f(2)=12, f(3)=5,
(X0=0 , Y0=2), (X1=1 , Y1=3), (X2=2 , Y2=12) , (X3=3 , Y3=5)
( ) =	
−
−
,
	
f(x)=(x3
+x2
-x+2)mod5
f(0)=(0+0-0+2)mod5=2 ,k=2
for i=0,1 2 , 3, 4 ,5 ,6 ………… di= 0, 2, 4, 6, 0, 177
Received message is MEWAAD
q0= 26*0+12 =12 q1=26*2+4=56 q2=26*4+22=120q3=26*6+ 0=136
q4=26*0+0=0 q5=26*177+4=4068
L{ ( )} == + + + + +
taking inverse integral transform both side using k=2
( ) = = (12 + 14
2
1!
+ 15
(2 )
2!
+ 3
(2 )
3!
+ 0
(2 )
4!
+ 24
(2 )
5!
… ),
messages ‘ MEWAAD’ converted to. ‘MONDAY’
V. CONCLUSION
This proposed algorithm is more secure because it is light weighted and in this algorithm first we secure the secret key
using Lagrange polynomial and integral transformation this higher secure method to secure key using node id in mobile
adhoc network. And after producing key we use this key for encryption and decryption that algorithm based on Laplace
transformation and modular arithmetic. Algorithm provides higher security.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 51
VI.FUTURE WORK
In this paper, a secure system for MANET is presented, which solves the problem of scalability of nodes in MANET. We
can improve the performance of the system by reducing the communication overhead among nodes.
REFERENCES
[1] M. B. Abdelhalim , M. El-Mahallawy , M. Ayyad , A. Elhennawy , Design & Implementation of an Encryption
Algorithm for use in RFID System , International Journal of RFID Security and Cryptography (IJRFIDSC), Volume
1, Issues 1/2, March/June 2012
[2 ] Mamatha.T , Network Security for MANETS International Journal of Soft Computing and Engineering (IJSCE) ,
Volume-2, Issue-2, May 2012
[3] Shushan Zhao, Akshai Aggarwal, Richard Frost, Xiaole Bai , A Survey of Applications of Identity-Based
Cryptography in Mobile Ad-Hoc Networks , IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 14,
NO. 2, SECOND QUARTER 2012
[4] Lu Li, Ze Wang, Wenju Liu and Yunlong , A Certificate less Key Management Scheme in Mobile Ad Hoc Networks
2011 IEEE
[5] A.Rajaram , Dr.S.Palaniswam, A High Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks ,
International Journal of Computer Science Issues, Vol. 7, Issue 4, No 5, July 2010
[6] EDUARDO DA SILVA, ALDRI L. DOS SANTOS, AND LUIZ CARLOS P. ALBINI , Identity based key
management in
mobile adhoc networks and applications, IEEE Wireless Communications • October 2008
[7] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” CRYPTO’84, LNCS, 1985,
[8] Anindo Mukherjee, Hongmei Deng, Dharma Agrawal , Distributed Pairwise Key Generation Using Shared
Polynomials for Wireless Ad Hoc Networks , Center of Distributed And Mobile Computing,University Of
Cincinnati, Cincinnati
[9] Li Wang, Jiu Hui Zhang “ Security Strategy of MANET Based on Identity- Based Cryptosystems” 2010 IEEE
[10] XU Xiao-long XIONG Jing-Yi, CHENG Chun-Ling “The Model and the Security Mechanism of the Information
Retrieval System based on Mobile Multi­ Agent” 2010 IEEE
[11]Derek Williams ,The Tiny Encryption Algorithm (TEA)CPSC 6128 – Network SecurityColumbus State
UniversityApril 26, 2008
[12] A. V. Reddy, “A Cryptanalysis of the Tiny Encryption Algorithm”, Master of Science, Department of Computer
Science in the Graduate School, The university of Alabama, 2003.
[13].A. P. Hiwarekar* VidyaPratishthan’s A NEW METHOD OF CRYPTOGRAPHY USING LAPLACE
TRANSFORM College of Engineering, Vidyanagari, M.I.D.C. Baramati, Dist.Pune, Maharashtra, 2012
[14].Mohammed A. Shreef, Image Encryption Using Lagrange-Least SquaresInterpolation 2013
ABOUT THE AUTHORS
Sumee Rai completed her B.Tech (Information Technology) with Hons. in 2011 from Mahatma
Gandhi Mission’s College of Engineering and Technology, Noida (U.P) and currently pursuing
M.Tech (Computer Engineering) from Shobhit University, Modipuram, Meerut. Her research
interest includes Mobile Adhoc Network, Algorithm analysis and Mobile Communication.
Nidhi Tyagi received her Ph.D. in Computer Engineering & IT, from Shobhit University, Modipuram, Meerut.
Presently she is working as Associate Professor at Shobhit University, Meerut. Her area of interest includes system
software, Data Structures and web technologies.
Pradeep Kumar is working as an assistant professor in JSS Academy of Technical Education,
Noida (U.P). He received his M.Tech. in Computer Engineering from Shobhit University, Meerut
in 2011 and completed his B-Tech from College of Engineering, Roorkee, Uttrakhand in 2005. His
area of interest includes MANET and Network Security.

More Related Content

What's hot

DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARDDATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARDijait
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DESIRJET Journal
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.CSCJournals
 
A new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternsA new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternseSAT Journals
 
New approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueNew approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueijcsit
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET Journal
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA AlgorithmIRJET Journal
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
 
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...TELKOMNIKA JOURNAL
 
A cloud security approach for data at rest
A cloud security approach for data at restA cloud security approach for data at rest
A cloud security approach for data at restijccsa
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...IRJET Journal
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET Journal
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
 

What's hot (17)

50120140507006
5012014050700650120140507006
50120140507006
 
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARDDATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
 
A new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternsA new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patterns
 
New approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueNew approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical technique
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS Transaction
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
 
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
 
A cloud security approach for data at rest
A cloud security approach for data at restA cloud security approach for data at rest
A cloud security approach for data at rest
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 

Viewers also liked

Fase I Yurelys Rangel C.I V- 10.877.774
Fase I  Yurelys Rangel C.I V- 10.877.774Fase I  Yurelys Rangel C.I V- 10.877.774
Fase I Yurelys Rangel C.I V- 10.877.774Yurelys Rangel
 
Field Service Engineer-LAB
Field Service Engineer-LABField Service Engineer-LAB
Field Service Engineer-LABSreekumar R V
 
Comparative Analysis of Face Recognition Algorithms for Medical Application
Comparative Analysis of Face Recognition Algorithms for Medical ApplicationComparative Analysis of Face Recognition Algorithms for Medical Application
Comparative Analysis of Face Recognition Algorithms for Medical ApplicationAM Publications
 
Community Events Toolkit
Community Events ToolkitCommunity Events Toolkit
Community Events ToolkitJennifer Graves
 
fuentes de apoyo económico para la financiación de propuestas o negocios verdes
fuentes de apoyo económico para la financiación de propuestas o negocios verdesfuentes de apoyo económico para la financiación de propuestas o negocios verdes
fuentes de apoyo económico para la financiación de propuestas o negocios verdesVictor Andres Davila Rodriguez
 
Analysis of bending strength of bevel gear by FEM
Analysis of bending strength of bevel gear by FEMAnalysis of bending strength of bevel gear by FEM
Analysis of bending strength of bevel gear by FEMAM Publications
 
Comportamento do consumidor - Teorias motivacionais
Comportamento do consumidor - Teorias motivacionaisComportamento do consumidor - Teorias motivacionais
Comportamento do consumidor - Teorias motivacionaisMauricio Valentini
 
E mail маркетинг
E mail маркетингE mail маркетинг
E mail маркетингMedMarketing
 
Training, Pruning and Ratooning in veg.crops
Training, Pruning and Ratooning in veg.cropsTraining, Pruning and Ratooning in veg.crops
Training, Pruning and Ratooning in veg.cropsLav Kumar
 
Recognising Property Rights In One's Body And Its Parts
Recognising Property Rights In One's Body And Its PartsRecognising Property Rights In One's Body And Its Parts
Recognising Property Rights In One's Body And Its PartsBenjamin Cope
 
Plan de Marketing Político
Plan de Marketing PolíticoPlan de Marketing Político
Plan de Marketing PolíticoMariana Circelli
 

Viewers also liked (16)

Fase I Yurelys Rangel C.I V- 10.877.774
Fase I  Yurelys Rangel C.I V- 10.877.774Fase I  Yurelys Rangel C.I V- 10.877.774
Fase I Yurelys Rangel C.I V- 10.877.774
 
Persistence hibernate
Persistence hibernatePersistence hibernate
Persistence hibernate
 
Field Service Engineer-LAB
Field Service Engineer-LABField Service Engineer-LAB
Field Service Engineer-LAB
 
Comparative Analysis of Face Recognition Algorithms for Medical Application
Comparative Analysis of Face Recognition Algorithms for Medical ApplicationComparative Analysis of Face Recognition Algorithms for Medical Application
Comparative Analysis of Face Recognition Algorithms for Medical Application
 
Community Events Toolkit
Community Events ToolkitCommunity Events Toolkit
Community Events Toolkit
 
Sila
SilaSila
Sila
 
Quinta sesión curso de Lliurex
Quinta sesión curso de LliurexQuinta sesión curso de Lliurex
Quinta sesión curso de Lliurex
 
fuentes de apoyo económico para la financiación de propuestas o negocios verdes
fuentes de apoyo económico para la financiación de propuestas o negocios verdesfuentes de apoyo económico para la financiación de propuestas o negocios verdes
fuentes de apoyo económico para la financiación de propuestas o negocios verdes
 
Valsartan 137862-53-4-api
Valsartan 137862-53-4-apiValsartan 137862-53-4-api
Valsartan 137862-53-4-api
 
Dipanjana bhattacharya resume
Dipanjana bhattacharya resumeDipanjana bhattacharya resume
Dipanjana bhattacharya resume
 
Analysis of bending strength of bevel gear by FEM
Analysis of bending strength of bevel gear by FEMAnalysis of bending strength of bevel gear by FEM
Analysis of bending strength of bevel gear by FEM
 
Comportamento do consumidor - Teorias motivacionais
Comportamento do consumidor - Teorias motivacionaisComportamento do consumidor - Teorias motivacionais
Comportamento do consumidor - Teorias motivacionais
 
E mail маркетинг
E mail маркетингE mail маркетинг
E mail маркетинг
 
Training, Pruning and Ratooning in veg.crops
Training, Pruning and Ratooning in veg.cropsTraining, Pruning and Ratooning in veg.crops
Training, Pruning and Ratooning in veg.crops
 
Recognising Property Rights In One's Body And Its Parts
Recognising Property Rights In One's Body And Its PartsRecognising Property Rights In One's Body And Its Parts
Recognising Property Rights In One's Body And Its Parts
 
Plan de Marketing Político
Plan de Marketing PolíticoPlan de Marketing Político
Plan de Marketing Político
 

Similar to Secure communication for mobile Adhoc network using (LPIT) Lagrange polynomial and Integral transform with Exponential Function

Implementation and Secured Authentication Key using Elliptic Curve Cryptography
Implementation and Secured Authentication Key using Elliptic Curve CryptographyImplementation and Secured Authentication Key using Elliptic Curve Cryptography
Implementation and Secured Authentication Key using Elliptic Curve CryptographyAM Publications,India
 
Survey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
Survey: Elliptic Curve Cryptography using Scalar Multiplication AlgorithmsSurvey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
Survey: Elliptic Curve Cryptography using Scalar Multiplication AlgorithmsAM Publications
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdleSAT Publishing House
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking Systemrahulmonikasharma
 
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelA Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelIRJET Journal
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Journals
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Publishing House
 
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...eSAT Publishing House
 
Gmdes a graph based modified data encryption standard algorithm with enha...
Gmdes     a graph based modified data encryption standard algorithm with enha...Gmdes     a graph based modified data encryption standard algorithm with enha...
Gmdes a graph based modified data encryption standard algorithm with enha...eSAT Journals
 
Securing voip communications in an open network
Securing voip communications in an open networkSecuring voip communications in an open network
Securing voip communications in an open networkeSAT Publishing House
 
Geometry in cryptography a review
Geometry in cryptography   a reviewGeometry in cryptography   a review
Geometry in cryptography a revieweSAT Journals
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsAM Publications
 
UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...
 UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica... UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...
UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...Venkata Swaroop
 
IRJET- Symmetric Cryptography using Neural Networks
IRJET-  	  Symmetric Cryptography using Neural NetworksIRJET-  	  Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural NetworksIRJET Journal
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 

Similar to Secure communication for mobile Adhoc network using (LPIT) Lagrange polynomial and Integral transform with Exponential Function (20)

Implementation and Secured Authentication Key using Elliptic Curve Cryptography
Implementation and Secured Authentication Key using Elliptic Curve CryptographyImplementation and Secured Authentication Key using Elliptic Curve Cryptography
Implementation and Secured Authentication Key using Elliptic Curve Cryptography
 
Survey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
Survey: Elliptic Curve Cryptography using Scalar Multiplication AlgorithmsSurvey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
Survey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking System
 
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelA Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...
 
Gmdes a graph based modified data encryption standard algorithm with enha...
Gmdes     a graph based modified data encryption standard algorithm with enha...Gmdes     a graph based modified data encryption standard algorithm with enha...
Gmdes a graph based modified data encryption standard algorithm with enha...
 
Securing voip communications in an open network
Securing voip communications in an open networkSecuring voip communications in an open network
Securing voip communications in an open network
 
Geometry in cryptography a review
Geometry in cryptography   a reviewGeometry in cryptography   a review
Geometry in cryptography a review
 
Jit dynamic cryptosystem
Jit dynamic cryptosystemJit dynamic cryptosystem
Jit dynamic cryptosystem
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
 
UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...
 UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica... UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...
UDRPG: Dynamic Key Management Based Node Authentication for Secret Communica...
 
IRJET- Symmetric Cryptography using Neural Networks
IRJET-  	  Symmetric Cryptography using Neural NetworksIRJET-  	  Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 

More from AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNAM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTAM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
 

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 

Secure communication for mobile Adhoc network using (LPIT) Lagrange polynomial and Integral transform with Exponential Function

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 45 Secure communication for mobile Adhoc network using (LPIT) Lagrange polynomial and Integral transform with Exponential Function Sumee Rai Nidhi Tyagi Pradeep Kumar Student, CS Associate Professor, CS Assistant Professor, CS Shobhit University, Shobhit University, JSSATE, UPTU Meerut-250110 Meerut-250110 Noida-201301 Abstract—Mobile adhoc network is collection of autonomous nodes that are frequently moving without the centralized control. Mobile adhoc networks are multi hop wireless networks without fixed infrastructure. Node frequently change topology, due to this type of behavior transformation of information from one node to another node is more complicated task. Decentralized nature of mobile adhoc network is more vulnerable to attack like denial of service (DOS) which consumes more bandwidth and resources. Security is major concern in adhoc network, so in this paper, we propose a new algorithm based on Lagrange polynomial and Laplace transform and inverse Laplace transform to enhance secure communication for MANET. This proposed algorithm provides security for transmission of information among node. Keywords—Mobile adhoc network, Lagrange Interpolation, Threshold Cryptography, Modular Arithmetic, Integral Transform I. INTRODUCTION Adhoc network is self-dependable infrastructure less network. Every node moves independently and communicates with each other without the help of any central control. Connection among mobile nodes are made through waves, topology changes dynamically during over all process of communication. Due to inherent characteristic of MANETs: open medium, lack of centralized control, dynamic movement of node ,etc, MANETs are highly vulnerable to attacks. Problem formulation: Main problem is highly secure communication among MANET node, so we proposed a secure algorithm based on Lagrange Polynomial and Laplace Transform. II. BACKGROUND Threshold Cryptography is the way to enhance security by creating partial secret shares and distribute among a set of n values based on node id. In a threshold cryptography scheme, out of n entities, we choose t (threshold value) entities (t<n) and calculate secret information on the basis of polynomial function. Quantum Cryptography (QC) depends on the uncertainty principle of quantum with which it is impossible to for an eavesdropper to detect the data being transmitted without disturbing the transmission. This method is not based on mathematics instead it is developed on the base of physics. The changes made by the eavesdropper will anonymously introduce high error rate in the transmission between sender and receiver. It makes use of photons (light particles) to generate keys. Provably secure key distribution is achieved by using two channels between sender and receiver. Public and quantum channels are used to transmit encrypted data and key distribution respectively. Integral transform has many applications in various fields such as Mechanics, Electrical circuit, Beam problems, Heat conduction, Wave equation, Transmission lines, Signals and Systems, Control systems, Communication Systems, Hydrodynamics, Solar systems. In this paper, we will discuss application of cryptography. In Shamir’s idea of identity- based cryptosystem [3], the recipient’s identity i is used to generate the encryption key, and the decryption key is derived from I and a random seed k. In an identity-based signature scheme, the signature key is generated from sender identity I and a random seed k, and the verification key is derived from sender’s identity i. Many IBC schemes [3,6] use threshold cryptography which originated from Shamir , for their key management. Shamir gives a solution to the problem of sharing a secret among a number of users. In his paper, he identifies the problem of how to divide data D into n pieces in such a way that D is easily reconstruct able from any t pieces, but even complete knowledge of t − 1 pieces reveals absolutely no information about D. In [8] a distributed pair wise key establishment scheme based on the concept of bivariate polynomials. In their method, any mobile node in an ad hoc network can securely communicate with other nodes just by knowing their corresponding IDs. The bivariate polynomials are shared in such a manner that the shares depend on the coefficient matrix of the polynomial, the requesting node's ID and the ID of the nodes that respond to the request. Identity-based cryptography specifies a cryptosystem in which both public and private keys are based on the identities of the users.[3,6] The idea of IBC was first proposed by Shamir in 1984.[7] Such a scheme has the property that
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 46 a user’s public key is an easily calculated function of his identity, while a user’s private key can be calculated for him by a trusted authority, called a Private Key Generator (PKG).Compared to traditional PKI, it saves storage and transmission of public keys and certificates, which is especially attractive for devices forming MANETs. The identity based cryptosystem [9] and shared the session key among the nodes of MANET. Identity based cryptosystem provides a new but safe strategy for communication in MANET, Strategy uses Lagrange interpolation to share the session key among the nodes of MANET. This paper realizes the safe communication in the MANET. Integral transformation based encryption provide higher secure algorithm. In this process use Laplace and inverse Laplace transformation. Algorithm which makes it suitable for embedded systems that require high performance; ease of implementation, high speed, low power consumption and low cost beside security. Proposed Security Architecture and Mechanism for wireless Information Transmission The architecture and detailed mechanism is discussed in section discus below respectively. III. SECURITY ARCHITECTURE Figure illustrates the working architecture based on threshold cryptography, Lagrange polynomial and Integral transformation. The proposed architecture is divided into modules like Generate session key using node id at both sender and receiver side, encryption using Integral transformation and decryption done by inverse integral transformation method using exponential function. Fig. 1 Secure Architecture based on Threshold Cryptography
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 47 Fig. 1 Flow Chart for generating partial keys, Encryption and decryption IV.KEY GENERATION, ENCRYPTION AND DECRYPTION Step -1 Key Generation In the first Module of key generation we explain about how we generate the session key by using threshold cryptography and Lagrange interpolation with modularithmetic to generate session key required Minimum tTh (Threshold value) no of node in cluster. Consider a Polynomial equation GF (p) is Finite field p>n Choose a0, a 1 , a 2 , a k-1∈GF (p) F(x) = (a0x0 + a 1 x1 + a 2 x 2 + … ..............+ a t-1 x t-1 ) mod p F(0)= a0=secret key (SK) and p is a huge prime number and a1, a2…, and ak-1 are arbitrarily chosen from Z/PZ. Then each user of identity id is provided with it partial key Si = f (idi). Their shares provide t distinct points (x, y) = (i, Si) calculate polynomail by using lagrange interpolation [5] ( ) = ∑ ∏ , Eq-1 Lagrange interpolation Since f (0) = a0 = S, the shared secret can be expressed as = Where = − , Secret key is genrated by t arbitary node(minimum no of threshold node) by using F(0)=a0modp=(SK) Step-2 Encryption Process Introduction to the Integral Transform Method The foundation of Integral theory is Lerch's cancellation law. The direct Integral transform or the integral of a function f (t) defined for 0≤t <∞ is the ordinary calculus integration problem
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 48 L{f(t)}= F(s)= ∫ f(t)e-st dt L-1 {F(S)}=f(t) L-1 is inverse Integral transform. Integral transformation is linear function that satisfies following 1. L{f(t) ±g(t)}= L{f(t)} ± L{g(t)} 2. L{d1f(t) = d1L{f(t)} d1 is constant. There are many application of Laplace transform like to solve differential equation, in physics and engineering. In this paper we use Laplace transformation to provide the security of information during transmission from one node to another node in mobile Adhoc network inter and intra communication. Using exponentail function = 1 + 1! + ( ) 2! + ( ) 3! + ⋯, k any real no.Multiply both sides by x = (1 + 1! + ( ) 2! + ( ) 3! + ⋯ ), k any real no. = 1 + 1! + ( ) 2! + ( ) 3! + ⋯, k is shared key generated by LaGrange polynomial. Let us consider plain text ( ) = = 0 1 + 1 1! + 2 ( ) 2! + 3 ( ) 3! + 4 ( ) 3! + 5 ( ) 3! …, ( ) = = ( 01 + 1 1! + 2 ( ) 2! + 3 ( ) 3! + 4 ( ) 3! + 5 ( ) 3! … ), ( ) =∑ (∞ 2n xn+1 / !) Taking Integral transform both side L ( )} = { } = { ( 01 + 1 ! + 2 ( ) ! + 3 ( ) ! + 4 ( ) ! + 5 ( ) ! … ), } L{ ( )}= + + + + … … … … … … … … … .. Modular Arithmetic Modular Arithmetic discovered by K.F. Gauss. Two numbers a and b are said to be equal or congruent modulo n iff n|(a-b), i.e. iff their difference is exactly divisible by n. Usually a, b, are nonnegative and n a positive integer. We write a = b (mod n). Ci=Gi mod26 for i=0, 1, 2, 3……………………n Ci=Gi-26difor i=0, 1, 2, 3……………………n All di for i=0, 1, 2, 3……………n Sharable between sender and receiver . C0, C1 ,C2 , C3 , C4 ……..Cn are Cipher text of Plain text P0, P1 , P2 ,P3, P4…………….Pn Step-3 Decryption Process Gi=Ci+ 26difor i=0, 1, 2, 3……………………n using di generate all Gi L{ ( )}= + + + + Taking inverse Laplace transforms both sides using LaGrange interpolation generate session key and generate P0, P1 , P2 ,P3, P4……….Pn Mechanism for secure Information transmission The proposed mechanism is divided into main three phases as follows. PHASE-1: Secret Key Generation using LaGrange interpolation polynomial  Random no generator generate node id.  Using node id Generate shared information of secret key A B C D - - Z 0 1 2 3 - - 25
  • 5. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 49  We fixed threshold no of node id ,to regenerate secret key  Consider a Polynomial equation GF (p) is Finite field p>n  Choose a0, a 1 , a 2 , a k-1∈GF (p) g(x) = (a0x0 + a 1 x1 + a 2 x 2 + … + a t-1 x t-1 ) mod p Total No of user=N; for(i=0; i<t; i++) {Id[i]; } for(i=0; i<t; i++) { nr=1; dr=1; for(j=0; j<t; j++) { If(j≠i) { nr=nr*(x-Id[j]); dr=dr*(Id[i])- Id[j]); g(x)=(nr/dr)*FId[i])); /*Polynomial Equation generated by node id*/ } Put the value of x and Generate Secrete KEY; Sk=g(x)mod p; /*SK-Session Key*/ /*session key use for secure communication among nodes.*/ PHASE-2: Encryption  Secret key generate from LaGrange polynomial use as key in Integral transform  Generate secure message using Integral transform. PHASE-3: Decryption  Generate session key using shared partial information  Decrypt message using inverse integral transformation. EXAMPLE Key Generation Choose a0, a 1 , a 2 , a k-1∈GF (p) F(x) = (a0x0 + a 1 x1 + a 2 x 2 + … ..............+ a t-1 x t-1 ) mod p a0 =2, a1, a2=1 ,a3=1 let us consider node id generated by random no generator consider 4 node id0=0 id1=1,id2=2,id3=3 prime no p=5, plynomail equation f(x)=(x3+x2-x+2)mod5 generate partial key using lagrange polynomail f(0)=2, f(1)=3, f(2)=12, f(3)=5, these partial key send to reciver side ,reciver generate session key using these partial key. k=f(0)=2mod5=2 Encryption Process Let us consider plain text MONDAY P0=12, P1=14,P2=15,P3=3,P4=0,P5=24 ( ) = = 0 1 + 1 1! + 2 ( ) 2! + 3 ( ) 3! + 4 ( ) 3! + 5 ( ) 3! …,
  • 6. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 50 ( ) = = ( 01 + 1 1! + 2 ( ) 2! + 3 ( ) 3! + 4 ( ) 3! + 5 ( ) 3! … ), for k=2 ( ) = = (12 + 14 1! + 15 ( ) 2! + 3 ( ) 3! + 0 ( ) 4! + 24 ( ) 5! … ), by using Integral transformation ,taking Integral transform both side of give equation consider k generated by Lagrange polynomial, L{ ( )} = { } = { 12 + 14 ! + 15 ( ) ! + 3 ( ) ! + 0 ( ) ! + 24 ( ) ! … }, for k=2 L{ ( )} = { } = { 12 + 14 ! + 15 ( ) ! + 3 ( ) ! + 0 ( ) ! + 24 ( ) ! … }, taking Integral transform both side = + + + + + q0=12, q1=56,q2=120,q3=136,q4=0,q5=4608 12=26(0)+12, 56=26(2)+4, 120=26(4)+22, 136=26(6)+0 , 0=26(0)+0 , 4608=26(177)+4 C0=12, C1=4, C2=22 ,C3=0, C4=0 , C5=4 are cipher text for i=0,1 2 , 3, 4 ,5 ,6 ………… di= 0, 2, 4, 6, 0, 177 shared between sender and receiver. messages ‘MONDAY’ converted to ‘ MEWAAD’. Decryption Process 1. using shared partial key generate secured key f(0)=2, f(1)=3, f(2)=12, f(3)=5, (X0=0 , Y0=2), (X1=1 , Y1=3), (X2=2 , Y2=12) , (X3=3 , Y3=5) ( ) = − − , f(x)=(x3 +x2 -x+2)mod5 f(0)=(0+0-0+2)mod5=2 ,k=2 for i=0,1 2 , 3, 4 ,5 ,6 ………… di= 0, 2, 4, 6, 0, 177 Received message is MEWAAD q0= 26*0+12 =12 q1=26*2+4=56 q2=26*4+22=120q3=26*6+ 0=136 q4=26*0+0=0 q5=26*177+4=4068 L{ ( )} == + + + + + taking inverse integral transform both side using k=2 ( ) = = (12 + 14 2 1! + 15 (2 ) 2! + 3 (2 ) 3! + 0 (2 ) 4! + 24 (2 ) 5! … ), messages ‘ MEWAAD’ converted to. ‘MONDAY’ V. CONCLUSION This proposed algorithm is more secure because it is light weighted and in this algorithm first we secure the secret key using Lagrange polynomial and integral transformation this higher secure method to secure key using node id in mobile adhoc network. And after producing key we use this key for encryption and decryption that algorithm based on Laplace transformation and modular arithmetic. Algorithm provides higher security.
  • 7. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 51 VI.FUTURE WORK In this paper, a secure system for MANET is presented, which solves the problem of scalability of nodes in MANET. We can improve the performance of the system by reducing the communication overhead among nodes. REFERENCES [1] M. B. Abdelhalim , M. El-Mahallawy , M. Ayyad , A. Elhennawy , Design & Implementation of an Encryption Algorithm for use in RFID System , International Journal of RFID Security and Cryptography (IJRFIDSC), Volume 1, Issues 1/2, March/June 2012 [2 ] Mamatha.T , Network Security for MANETS International Journal of Soft Computing and Engineering (IJSCE) , Volume-2, Issue-2, May 2012 [3] Shushan Zhao, Akshai Aggarwal, Richard Frost, Xiaole Bai , A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks , IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 14, NO. 2, SECOND QUARTER 2012 [4] Lu Li, Ze Wang, Wenju Liu and Yunlong , A Certificate less Key Management Scheme in Mobile Ad Hoc Networks 2011 IEEE [5] A.Rajaram , Dr.S.Palaniswam, A High Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks , International Journal of Computer Science Issues, Vol. 7, Issue 4, No 5, July 2010 [6] EDUARDO DA SILVA, ALDRI L. DOS SANTOS, AND LUIZ CARLOS P. ALBINI , Identity based key management in mobile adhoc networks and applications, IEEE Wireless Communications • October 2008 [7] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” CRYPTO’84, LNCS, 1985, [8] Anindo Mukherjee, Hongmei Deng, Dharma Agrawal , Distributed Pairwise Key Generation Using Shared Polynomials for Wireless Ad Hoc Networks , Center of Distributed And Mobile Computing,University Of Cincinnati, Cincinnati [9] Li Wang, Jiu Hui Zhang “ Security Strategy of MANET Based on Identity- Based Cryptosystems” 2010 IEEE [10] XU Xiao-long XIONG Jing-Yi, CHENG Chun-Ling “The Model and the Security Mechanism of the Information Retrieval System based on Mobile Multi­ Agent” 2010 IEEE [11]Derek Williams ,The Tiny Encryption Algorithm (TEA)CPSC 6128 – Network SecurityColumbus State UniversityApril 26, 2008 [12] A. V. Reddy, “A Cryptanalysis of the Tiny Encryption Algorithm”, Master of Science, Department of Computer Science in the Graduate School, The university of Alabama, 2003. [13].A. P. Hiwarekar* VidyaPratishthan’s A NEW METHOD OF CRYPTOGRAPHY USING LAPLACE TRANSFORM College of Engineering, Vidyanagari, M.I.D.C. Baramati, Dist.Pune, Maharashtra, 2012 [14].Mohammed A. Shreef, Image Encryption Using Lagrange-Least SquaresInterpolation 2013 ABOUT THE AUTHORS Sumee Rai completed her B.Tech (Information Technology) with Hons. in 2011 from Mahatma Gandhi Mission’s College of Engineering and Technology, Noida (U.P) and currently pursuing M.Tech (Computer Engineering) from Shobhit University, Modipuram, Meerut. Her research interest includes Mobile Adhoc Network, Algorithm analysis and Mobile Communication. Nidhi Tyagi received her Ph.D. in Computer Engineering & IT, from Shobhit University, Modipuram, Meerut. Presently she is working as Associate Professor at Shobhit University, Meerut. Her area of interest includes system software, Data Structures and web technologies. Pradeep Kumar is working as an assistant professor in JSS Academy of Technical Education, Noida (U.P). He received his M.Tech. in Computer Engineering from Shobhit University, Meerut in 2011 and completed his B-Tech from College of Engineering, Roorkee, Uttrakhand in 2005. His area of interest includes MANET and Network Security.