SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 1 (Sep. - Oct. 2013), PP 13-16
www.iosrjournals.org
www.iosrjournals.org 13 | Page
Performance evaluation of Hard and Soft Wimax by using PGP
and PKM protocols with RSA Algorithm
Gurpreet Singh1
, Dr. Sandeep Singh Kang2
1
(M.Tech student, Department of CSE, Chandigarh Engineering College, Landran)
2
(Professor & Head, Department of CSE, Chandigarh Group of Colleges, Landran)
Abstract: Wimax is a wireless metropolitan area network (MAN) technology that provides interoperability,
carrier class broadband wireless connectivity to fixed, portable for the last mile. Wimax (Worldwide
interoperability for microwave access) is based on IEEE 802.16 standards that provide wireless access to
metropolitan area networks and there are several security problems The Wimax technology has great impact in
wireless communication and has notched the top position in the wireless technology. But there still are a lot of
securities concerns while using such wireless technologies, especially for Wimax where we have to transfer
secure data at high rate from one station to another station. Wimax works at the longer distances so there is
more security required to protect the communication from attacks and threats. Wimax is a wireless network
which is considered to be more vulnerable to attacks and threats than wired network as data transfer publicity
in open areas. For secure the communication in Wimax various algorithms and security protocols are used. The
researchers have developed various mechanisms which have made a great impact on secure communications in
Wimax. Various encryption and authentication mechanisms are being used for secure communication. The
concept of use multiple keys with RSA algorithms using PKM (Privacy & Key management) protocol has been
used for secure communication. This concept is extended in this paper by combining PGP (Pretty Good
Privacy) protocol with RSA algorithm to further improve the secure communication in Wimax. This paper
compares the performance of Hard Wimax and Soft Wimax using PKM and PGP protocols over RSA. The
performance is analyzed over NS 2.34 simulator using delay, throughput and packet delivery as performance
metrics.
Keywords - PGP, PKM, RSA, WIMAX, WMAN.
I. INTRODUCTION
Wimax(Worldwide interoperability for microwave access) is an emerging wireless communication
system that is expected to provide high data rate communication in metropolitan area networks(WMAN).IEEE
802.16 working group has developed a number of standards for Wimax [1]. The Privacy Key Management
(PKM) Protocol is used to gain authorization and traffic keying material from the Wimax Base Station (BS), and
to maintain periodic reauthorization and key. Wimax CPE (Customer Premise Equipment) act as the client
requests keying material while the Wimax Base Station (BS) act as the server act in response to those requests,
ensuring individual Wimax CPE (Customer Premise Equipment) clients receive only the keying material for
which they are authorized [5]. The authorization protocol for the both version of PKM model is used in Wimax
network [3]. Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides
cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and
decrypting texts, e-mails, files, directories and whole disk partitions to increase the security of e-mail
communications [7]. RSA is an algorithm for public-key cryptography that is based on the presumed difficulty
of factoring large integers, the factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard
Adelman. RSA involves a public key and a private key [8].
In this paper the focus lies on enhancement in security mechanism by combining PGP (Pretty Good
Privacy) protocol with PKM (Privacy and Key Management) protocol over RSA algorithm. We combine these
two protocols using RSA mechanism and compare Hard and Soft Wimax using three performance metrics of
delay, throughput and packet delivery.
In Section II the security protocols used in this work are briefly discussed followed by the Encryption
mechanism in Section III. The simulation environment and performance metrics are discussed in Section IV and
the Section V contains the conclusion and future scope.
II. SECURITY PROTOCOLS
There are several protocols proposed for security in the wireless networks. We have to use the
combinations of PKM and PGP securities with RSA algorithms for encrypting the information. We have to
compare the performance of Soft Wimax and Hard Wimax of PGP and PKM protocol with security implanted
by using RSA algorithms.
Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols with RSA
www.iosrjournals.org 14 | Page
A: PKM (Privacy and Key Management) Protocol
The Privacy Key Management (PKM) Protocol is used to gain authorization and traffic keying material
from the Wimax Base Station (BS), and to maintain periodic reauthorization and key. Wimax CPE (Customer
Premise Equipment) act as the client requests keying material while the Wimax Base Station (BS) act as the
server act in response to those requests, ensuring individual Wimax CPE (Customer Premise Equipment) clients
receive only the keying material for which they are authorized. The AK is then used to protect subsequent
Privacy Key Management (PKM) Protocol. [5]. The study Privacy Key and Management (PKM) shows that the
security in the PKMv2 is more confidential than that of PKMv1 so the PKMv2 model is mainly used in secure
communications. But in the wireless network security is not guarantee because PKMv2 model also suffers from
various security threats and attacks, like replay and interleaving attacks [6].
B: PGP (Pretty Good Privacy) Protocol
Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides
cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and
decrypting texts, e-mails, files, directories and whole disk partitions to increase the security of e-mail
communications. To the best of publicly available information, there is no known method which will allow a
person or group to break PGP encryption by cryptographic or computational means. As current versions of PGP
have added additional encryption algorithms, the degree of their cryptographic vulnerability varies with the
algorithm used. New versions of PGP are released periodically and vulnerabilities are fixed by developers as
they come to light. Any agency wanting to read PGP messages would probably use easier means than standard
cryptanalysis [7].
III. ENCRYPTION MECHANISM
There are various encrypting mechanisms are used for secure communication like RSA, RC4 and AES.
In this paper we have to used the combination of PKM and PGP protocols with RSA encrypting algorithms
because it provide better encrypting than other algorithms and processing of the networks also don’t slow down.
RSA algorithm
RSA is an algorithm for public-key cryptography that is based on the presumed difficulty of factoring
large integers, the factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard Adelman. RSA
involves a public key and a private key. The public key can be known by everyone and is used for encrypting
messages. Messages encrypted with the public key can only be decrypted in a reasonable amount of time using
the private key. The public key consists of the modulus n and the public (or encryption) exponent e. The private
key consists of the modulus n and the private (or decryption) exponent d, which must be kept secret. p, q, and
φ(n) must also be kept secret because they can be used to calculated [8].
IV. SIMULATION ENVIRONMENT
The study of secure communication is based on experimental setup which is performed using NS 2.34
simulator. The encryption algorithm used in RSA and the security protocols chosen are PKM and PGP. The In
general, NS 2.34 provides users with a way of specifying such network protocols and simulating their
corresponding behaviours. NS 2.34 is simply an event driven simulation tool that has proved useful in studying
the dynamic nature of communication networks. Simulation of wired as well as wireless network functions and
protocols [12].
PERFORMANCE METRICS:
The performance metrics are used to analyze the performance of Hard and Soft Wimax on the
quantitavely based on values of the results. The results of our study are based on performance metrics as given
below:
Throughput- Throughput is defined as the ratio of the total data reaches a receiver from the sender. The time
consumed by the receiver to receive the last packet is called throughput. Throughput is expressed as bytes or bits
per sec (byte/sec or bit/sec).
Delay- The packet end-to-end delay is the average time of the packet passing through the network. It includes
over all delay of the network like transmission time delay which to the networks, buffer, queues. It also includes
the time from generating packet from sender to destination and express in seconds.
Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols with RSA
www.iosrjournals.org 15 | Page
Packet Delivery- Packet dropped shows how many packets successfully sent and received across the whole
network. It also explains the number of packet dropped during the transmission due to interference from other
devices.
V. SIMULATION RESULTS
In this section we analyze the simulation results conducted on protocols. The main target of this paper
is to analyze the performance of PKM and PGP with RSA algorithms. The results are based on experiments of
delay, packet dropped and throughput. The results are shown below:
Delay
The Fig. 1 shows the entire delay for network with combination of PGP and PKM protocols. The
results clearly show that the Hard Wimax shows high delay as compared to the Soft Wimax with PGP and PKM
protocols using RSA algorithm. Initially both shows equivalent delay but later on Soft Wimax shows lower
delay as compared to Hard Wimax.
Fig 1: Delay for Hard Wimax and Soft Wimax
Throughput
The Fig. 2 shows the throughput of network with using combination of PGP and PKM protocol with
RSA algorithm in Wimax Network. The result shows that the Soft Wimax shows high throughput as compared
to the Hard WiMAX.
Fig. 2: Throughput for Hard Wimax and Soft Wimax
Packet Delivery
The Fig. 3 shows the packet delivery in the network with using combination of PGP and PKM protocol
with RSA algorithm over Wimax Network. The results show that the Soft Wimax shows better packet delivery
as compared to the Hard Wimax.
Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols with RSA
www.iosrjournals.org 16 | Page
Fig. 3: Packet Delivery for Hard Wimax and Soft Wimax
VI. CONCLUSION AND FUTURE WORK
This study clearly shows that the Soft Wimax shows better performance over Hard Wimax. The study
also shows an enhanced mechanism for secure communication over Wimax Network. The following points may
be concluded from this experimental study:
 The Soft Wimax Shows lower delay. The discussion of shows that Hard Wimax have more delay time
for transmitting the data in the network thus it will be affect the performance of the network
 The Soft Wimax shows higher throughput and hence a better performance.
 The Soft Wimax shows better packet delivery than Hard Wimax which is an essential factor for good
performance.
Hence the overall result shows a better performance by Soft Wimax than Hard Wimax.
In the future work there are various encrypting algorithms and protocols used for secure communication that can
be evaluated. A modified protocol with combination of PKM and PGP can also be developed for better
performance.
References
[1] Lu, K., Qian, Y. and Chen, H. (2007), “A Secure and Service-Oriented Network Control Framework for Wimax Networks”, IEEE
Communication Magazine, May 2007.
[2] Habib, M., Ahmed, M. (2010), “A Review of Some Security Aspects of Wimax & Converged Network”, IEEE 2010 Second
International Conference on Communication Software and Networks.
[3] Altaf,A., Ahmed,A.and Javed,M. (2008), ”Security Enhancement for Privacy and Key Management Protocol in IEEE 802.16e-
2005”.IEEE Ninth ACIS International Conference on Software Engineering, Artificial Intelligence,Networking and
Parallel/Distributed Computing.
[4] Taha, A., Abdel-Hamid, A., and Tahar, S. (2009), “Formal Verification of IEEE 802.16 Security Sub layer Using Scyther Tool”,
2009 ESR Grops France.
[5] http://freewimaxinfo.com/pkm-protocol.html.
[6] Altaf,A., Ahmed,A.and Javed,M. (2008), ”Security Enhancement for Privacy and Key Management Protocol in IEEE 802.16e-
2005”.IEEE Ninth ACIS International Conference on Software Engineering, Artificial Intelligence,Networking and
Parallel/Distributed Computing.
[7] http://en.wikipedia.org/wiki/Pretty_Good_Privacy.
[8] http://en.wikipedia.org/wiki/RSA_28algorithm.
[9] Yang, F. (2011), “Comparative Analysis on TEK Exchange between PKMv1 and PKMv2 for Wimax”, IEEE 2011 School of
Information and Security Engineering, Zhongnan University of Economics and Law.
[10] Xu, S., Huang, T., and Matthew, M. (2008), “Modelling and Analysis of IEEE 802.16 PKM Protocol using CasperFRD”, IEEE
2008.
[11] Adibi,S., Lin, B., Ho,P., Agnew,G., Erfani, S. (2006), ”Authentication Authorization and Accounting (AAA) Schemes in Wimax”,
Electro/information Technology, 2006 IEEE International Conference on 7-10 May.
[12] Introduction to Network Simulator NS2_c 2009 Springer Science Business Media, e-ISBN: 978-0-387-71760-9

More Related Content

What's hot

Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
 
Agent based intrusion detection, response and blocking using signature method...
Agent based intrusion detection, response and blocking using signature method...Agent based intrusion detection, response and blocking using signature method...
Agent based intrusion detection, response and blocking using signature method...Mumbai Academisc
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIJNSA Journal
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...INFOGAIN PUBLICATION
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystemsijtsrd
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches forijcsa
 
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkIJCNCJournal
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesPriyangaRajaram
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threatsijtsrd
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
 
Designing.and.implementing.linux
Designing.and.implementing.linuxDesigning.and.implementing.linux
Designing.and.implementing.linuxgavin shaw
 
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...IJNSA Journal
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGIJNSA Journal
 

What's hot (19)

Unit 5
Unit 5Unit 5
Unit 5
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
Cryptographic lifecycle security training
Cryptographic lifecycle security trainingCryptographic lifecycle security training
Cryptographic lifecycle security training
 
Agent based intrusion detection, response and blocking using signature method...
Agent based intrusion detection, response and blocking using signature method...Agent based intrusion detection, response and blocking using signature method...
Agent based intrusion detection, response and blocking using signature method...
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
 
L4 vpn
L4  vpnL4  vpn
L4 vpn
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threats
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
 
Designing.and.implementing.linux
Designing.and.implementing.linuxDesigning.and.implementing.linux
Designing.and.implementing.linux
 
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
 
I1086066
I1086066I1086066
I1086066
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
 

Viewers also liked

Color to Gray and back’ using normalization of color components with Cosine, ...
Color to Gray and back’ using normalization of color components with Cosine, ...Color to Gray and back’ using normalization of color components with Cosine, ...
Color to Gray and back’ using normalization of color components with Cosine, ...IOSR Journals
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
Whistler Animal Shelter - 10th Annual K9 Wine & Dine
Whistler Animal Shelter - 10th Annual K9 Wine & DineWhistler Animal Shelter - 10th Annual K9 Wine & Dine
Whistler Animal Shelter - 10th Annual K9 Wine & DineWhistler Animals Galore
 
R120234【メソ研】003
R120234【メソ研】003R120234【メソ研】003
R120234【メソ研】003Sei Sumi
 
A way of managing data center networks
A way of managing data center networksA way of managing data center networks
A way of managing data center networksIOSR Journals
 
Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...
Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...
Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...IOSR Journals
 
Linux-Based Data Acquisition and Processing On Palmtop Computer
Linux-Based Data Acquisition and Processing On Palmtop ComputerLinux-Based Data Acquisition and Processing On Palmtop Computer
Linux-Based Data Acquisition and Processing On Palmtop ComputerIOSR Journals
 
Distinguishing Cognitive Tasks Using Statistical Analysis Techniques
Distinguishing Cognitive Tasks Using Statistical Analysis TechniquesDistinguishing Cognitive Tasks Using Statistical Analysis Techniques
Distinguishing Cognitive Tasks Using Statistical Analysis TechniquesIOSR Journals
 
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...IOSR Journals
 
Medical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set MethodMedical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set MethodIOSR Journals
 
Implementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record LinkageImplementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record LinkageIOSR Journals
 
Effect of vermicompost on biotransformation and bioavailability of hexavalent...
Effect of vermicompost on biotransformation and bioavailability of hexavalent...Effect of vermicompost on biotransformation and bioavailability of hexavalent...
Effect of vermicompost on biotransformation and bioavailability of hexavalent...IOSR Journals
 
A.chuyende tnsua lan
A.chuyende tnsua lanA.chuyende tnsua lan
A.chuyende tnsua lanphihoanhbmt
 
Channel Fading Detection in Manets with Hand off Strategy
Channel Fading Detection in Manets with Hand off StrategyChannel Fading Detection in Manets with Hand off Strategy
Channel Fading Detection in Manets with Hand off StrategyIOSR Journals
 
Web Mining Research Issues and Future Directions – A Survey
Web Mining Research Issues and Future Directions – A SurveyWeb Mining Research Issues and Future Directions – A Survey
Web Mining Research Issues and Future Directions – A SurveyIOSR Journals
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised ComputingIOSR Journals
 
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...IOSR Journals
 
Творческое чтение и развитие одарённости
Творческое чтение и развитие одарённостиТворческое чтение и развитие одарённости
Творческое чтение и развитие одарённостиNatalya Dyrda
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionIOSR Journals
 

Viewers also liked (20)

Color to Gray and back’ using normalization of color components with Cosine, ...
Color to Gray and back’ using normalization of color components with Cosine, ...Color to Gray and back’ using normalization of color components with Cosine, ...
Color to Gray and back’ using normalization of color components with Cosine, ...
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
Whistler Animal Shelter - 10th Annual K9 Wine & Dine
Whistler Animal Shelter - 10th Annual K9 Wine & DineWhistler Animal Shelter - 10th Annual K9 Wine & Dine
Whistler Animal Shelter - 10th Annual K9 Wine & Dine
 
R120234【メソ研】003
R120234【メソ研】003R120234【メソ研】003
R120234【メソ研】003
 
A way of managing data center networks
A way of managing data center networksA way of managing data center networks
A way of managing data center networks
 
Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...
Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...
Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...
 
Linux-Based Data Acquisition and Processing On Palmtop Computer
Linux-Based Data Acquisition and Processing On Palmtop ComputerLinux-Based Data Acquisition and Processing On Palmtop Computer
Linux-Based Data Acquisition and Processing On Palmtop Computer
 
Distinguishing Cognitive Tasks Using Statistical Analysis Techniques
Distinguishing Cognitive Tasks Using Statistical Analysis TechniquesDistinguishing Cognitive Tasks Using Statistical Analysis Techniques
Distinguishing Cognitive Tasks Using Statistical Analysis Techniques
 
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
 
Medical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set MethodMedical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set Method
 
Implementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record LinkageImplementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record Linkage
 
Effect of vermicompost on biotransformation and bioavailability of hexavalent...
Effect of vermicompost on biotransformation and bioavailability of hexavalent...Effect of vermicompost on biotransformation and bioavailability of hexavalent...
Effect of vermicompost on biotransformation and bioavailability of hexavalent...
 
A.chuyende tnsua lan
A.chuyende tnsua lanA.chuyende tnsua lan
A.chuyende tnsua lan
 
Channel Fading Detection in Manets with Hand off Strategy
Channel Fading Detection in Manets with Hand off StrategyChannel Fading Detection in Manets with Hand off Strategy
Channel Fading Detection in Manets with Hand off Strategy
 
Web Mining Research Issues and Future Directions – A Survey
Web Mining Research Issues and Future Directions – A SurveyWeb Mining Research Issues and Future Directions – A Survey
Web Mining Research Issues and Future Directions – A Survey
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
 
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
 
Творческое чтение и развитие одарённости
Творческое чтение и развитие одарённостиТворческое чтение и развитие одарённости
Творческое чтение и развитие одарённости
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage Detection
 

Similar to Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols with RSA Algorithm

IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
 
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXSECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXIJNSA Journal
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLIJNSA Journal
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation ofcaijjournal
 
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...IJECEIAES
 
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...IRJET Journal
 
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET Journal
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
 
comparisonofcost of protectionof selected ciphers.pdf
comparisonofcost of protectionof selected ciphers.pdfcomparisonofcost of protectionof selected ciphers.pdf
comparisonofcost of protectionof selected ciphers.pdfARPriyarenjini
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10Nithirekha
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Jayanth Dwijesh H P
 
Go3611771182
Go3611771182Go3611771182
Go3611771182IJERA Editor
 

Similar to Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols with RSA Algorithm (20)

Ew25914917
Ew25914917Ew25914917
Ew25914917
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXSECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation of
 
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
 
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
 
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 
comparisonofcost of protectionof selected ciphers.pdf
comparisonofcost of protectionof selected ciphers.pdfcomparisonofcost of protectionof selected ciphers.pdf
comparisonofcost of protectionof selected ciphers.pdf
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsArindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 

Recently uploaded (20)

HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 

Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols with RSA Algorithm

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 1 (Sep. - Oct. 2013), PP 13-16 www.iosrjournals.org www.iosrjournals.org 13 | Page Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols with RSA Algorithm Gurpreet Singh1 , Dr. Sandeep Singh Kang2 1 (M.Tech student, Department of CSE, Chandigarh Engineering College, Landran) 2 (Professor & Head, Department of CSE, Chandigarh Group of Colleges, Landran) Abstract: Wimax is a wireless metropolitan area network (MAN) technology that provides interoperability, carrier class broadband wireless connectivity to fixed, portable for the last mile. Wimax (Worldwide interoperability for microwave access) is based on IEEE 802.16 standards that provide wireless access to metropolitan area networks and there are several security problems The Wimax technology has great impact in wireless communication and has notched the top position in the wireless technology. But there still are a lot of securities concerns while using such wireless technologies, especially for Wimax where we have to transfer secure data at high rate from one station to another station. Wimax works at the longer distances so there is more security required to protect the communication from attacks and threats. Wimax is a wireless network which is considered to be more vulnerable to attacks and threats than wired network as data transfer publicity in open areas. For secure the communication in Wimax various algorithms and security protocols are used. The researchers have developed various mechanisms which have made a great impact on secure communications in Wimax. Various encryption and authentication mechanisms are being used for secure communication. The concept of use multiple keys with RSA algorithms using PKM (Privacy & Key management) protocol has been used for secure communication. This concept is extended in this paper by combining PGP (Pretty Good Privacy) protocol with RSA algorithm to further improve the secure communication in Wimax. This paper compares the performance of Hard Wimax and Soft Wimax using PKM and PGP protocols over RSA. The performance is analyzed over NS 2.34 simulator using delay, throughput and packet delivery as performance metrics. Keywords - PGP, PKM, RSA, WIMAX, WMAN. I. INTRODUCTION Wimax(Worldwide interoperability for microwave access) is an emerging wireless communication system that is expected to provide high data rate communication in metropolitan area networks(WMAN).IEEE 802.16 working group has developed a number of standards for Wimax [1]. The Privacy Key Management (PKM) Protocol is used to gain authorization and traffic keying material from the Wimax Base Station (BS), and to maintain periodic reauthorization and key. Wimax CPE (Customer Premise Equipment) act as the client requests keying material while the Wimax Base Station (BS) act as the server act in response to those requests, ensuring individual Wimax CPE (Customer Premise Equipment) clients receive only the keying material for which they are authorized [5]. The authorization protocol for the both version of PKM model is used in Wimax network [3]. Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, e-mails, files, directories and whole disk partitions to increase the security of e-mail communications [7]. RSA is an algorithm for public-key cryptography that is based on the presumed difficulty of factoring large integers, the factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard Adelman. RSA involves a public key and a private key [8]. In this paper the focus lies on enhancement in security mechanism by combining PGP (Pretty Good Privacy) protocol with PKM (Privacy and Key Management) protocol over RSA algorithm. We combine these two protocols using RSA mechanism and compare Hard and Soft Wimax using three performance metrics of delay, throughput and packet delivery. In Section II the security protocols used in this work are briefly discussed followed by the Encryption mechanism in Section III. The simulation environment and performance metrics are discussed in Section IV and the Section V contains the conclusion and future scope. II. SECURITY PROTOCOLS There are several protocols proposed for security in the wireless networks. We have to use the combinations of PKM and PGP securities with RSA algorithms for encrypting the information. We have to compare the performance of Soft Wimax and Hard Wimax of PGP and PKM protocol with security implanted by using RSA algorithms.
  • 2. Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols with RSA www.iosrjournals.org 14 | Page A: PKM (Privacy and Key Management) Protocol The Privacy Key Management (PKM) Protocol is used to gain authorization and traffic keying material from the Wimax Base Station (BS), and to maintain periodic reauthorization and key. Wimax CPE (Customer Premise Equipment) act as the client requests keying material while the Wimax Base Station (BS) act as the server act in response to those requests, ensuring individual Wimax CPE (Customer Premise Equipment) clients receive only the keying material for which they are authorized. The AK is then used to protect subsequent Privacy Key Management (PKM) Protocol. [5]. The study Privacy Key and Management (PKM) shows that the security in the PKMv2 is more confidential than that of PKMv1 so the PKMv2 model is mainly used in secure communications. But in the wireless network security is not guarantee because PKMv2 model also suffers from various security threats and attacks, like replay and interleaving attacks [6]. B: PGP (Pretty Good Privacy) Protocol Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, e-mails, files, directories and whole disk partitions to increase the security of e-mail communications. To the best of publicly available information, there is no known method which will allow a person or group to break PGP encryption by cryptographic or computational means. As current versions of PGP have added additional encryption algorithms, the degree of their cryptographic vulnerability varies with the algorithm used. New versions of PGP are released periodically and vulnerabilities are fixed by developers as they come to light. Any agency wanting to read PGP messages would probably use easier means than standard cryptanalysis [7]. III. ENCRYPTION MECHANISM There are various encrypting mechanisms are used for secure communication like RSA, RC4 and AES. In this paper we have to used the combination of PKM and PGP protocols with RSA encrypting algorithms because it provide better encrypting than other algorithms and processing of the networks also don’t slow down. RSA algorithm RSA is an algorithm for public-key cryptography that is based on the presumed difficulty of factoring large integers, the factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard Adelman. RSA involves a public key and a private key. The public key can be known by everyone and is used for encrypting messages. Messages encrypted with the public key can only be decrypted in a reasonable amount of time using the private key. The public key consists of the modulus n and the public (or encryption) exponent e. The private key consists of the modulus n and the private (or decryption) exponent d, which must be kept secret. p, q, and φ(n) must also be kept secret because they can be used to calculated [8]. IV. SIMULATION ENVIRONMENT The study of secure communication is based on experimental setup which is performed using NS 2.34 simulator. The encryption algorithm used in RSA and the security protocols chosen are PKM and PGP. The In general, NS 2.34 provides users with a way of specifying such network protocols and simulating their corresponding behaviours. NS 2.34 is simply an event driven simulation tool that has proved useful in studying the dynamic nature of communication networks. Simulation of wired as well as wireless network functions and protocols [12]. PERFORMANCE METRICS: The performance metrics are used to analyze the performance of Hard and Soft Wimax on the quantitavely based on values of the results. The results of our study are based on performance metrics as given below: Throughput- Throughput is defined as the ratio of the total data reaches a receiver from the sender. The time consumed by the receiver to receive the last packet is called throughput. Throughput is expressed as bytes or bits per sec (byte/sec or bit/sec). Delay- The packet end-to-end delay is the average time of the packet passing through the network. It includes over all delay of the network like transmission time delay which to the networks, buffer, queues. It also includes the time from generating packet from sender to destination and express in seconds.
  • 3. Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols with RSA www.iosrjournals.org 15 | Page Packet Delivery- Packet dropped shows how many packets successfully sent and received across the whole network. It also explains the number of packet dropped during the transmission due to interference from other devices. V. SIMULATION RESULTS In this section we analyze the simulation results conducted on protocols. The main target of this paper is to analyze the performance of PKM and PGP with RSA algorithms. The results are based on experiments of delay, packet dropped and throughput. The results are shown below: Delay The Fig. 1 shows the entire delay for network with combination of PGP and PKM protocols. The results clearly show that the Hard Wimax shows high delay as compared to the Soft Wimax with PGP and PKM protocols using RSA algorithm. Initially both shows equivalent delay but later on Soft Wimax shows lower delay as compared to Hard Wimax. Fig 1: Delay for Hard Wimax and Soft Wimax Throughput The Fig. 2 shows the throughput of network with using combination of PGP and PKM protocol with RSA algorithm in Wimax Network. The result shows that the Soft Wimax shows high throughput as compared to the Hard WiMAX. Fig. 2: Throughput for Hard Wimax and Soft Wimax Packet Delivery The Fig. 3 shows the packet delivery in the network with using combination of PGP and PKM protocol with RSA algorithm over Wimax Network. The results show that the Soft Wimax shows better packet delivery as compared to the Hard Wimax.
  • 4. Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols with RSA www.iosrjournals.org 16 | Page Fig. 3: Packet Delivery for Hard Wimax and Soft Wimax VI. CONCLUSION AND FUTURE WORK This study clearly shows that the Soft Wimax shows better performance over Hard Wimax. The study also shows an enhanced mechanism for secure communication over Wimax Network. The following points may be concluded from this experimental study:  The Soft Wimax Shows lower delay. The discussion of shows that Hard Wimax have more delay time for transmitting the data in the network thus it will be affect the performance of the network  The Soft Wimax shows higher throughput and hence a better performance.  The Soft Wimax shows better packet delivery than Hard Wimax which is an essential factor for good performance. Hence the overall result shows a better performance by Soft Wimax than Hard Wimax. In the future work there are various encrypting algorithms and protocols used for secure communication that can be evaluated. A modified protocol with combination of PKM and PGP can also be developed for better performance. References [1] Lu, K., Qian, Y. and Chen, H. (2007), “A Secure and Service-Oriented Network Control Framework for Wimax Networks”, IEEE Communication Magazine, May 2007. [2] Habib, M., Ahmed, M. (2010), “A Review of Some Security Aspects of Wimax & Converged Network”, IEEE 2010 Second International Conference on Communication Software and Networks. [3] Altaf,A., Ahmed,A.and Javed,M. (2008), ”Security Enhancement for Privacy and Key Management Protocol in IEEE 802.16e- 2005”.IEEE Ninth ACIS International Conference on Software Engineering, Artificial Intelligence,Networking and Parallel/Distributed Computing. [4] Taha, A., Abdel-Hamid, A., and Tahar, S. (2009), “Formal Verification of IEEE 802.16 Security Sub layer Using Scyther Tool”, 2009 ESR Grops France. [5] http://freewimaxinfo.com/pkm-protocol.html. [6] Altaf,A., Ahmed,A.and Javed,M. (2008), ”Security Enhancement for Privacy and Key Management Protocol in IEEE 802.16e- 2005”.IEEE Ninth ACIS International Conference on Software Engineering, Artificial Intelligence,Networking and Parallel/Distributed Computing. [7] http://en.wikipedia.org/wiki/Pretty_Good_Privacy. [8] http://en.wikipedia.org/wiki/RSA_28algorithm. [9] Yang, F. (2011), “Comparative Analysis on TEK Exchange between PKMv1 and PKMv2 for Wimax”, IEEE 2011 School of Information and Security Engineering, Zhongnan University of Economics and Law. [10] Xu, S., Huang, T., and Matthew, M. (2008), “Modelling and Analysis of IEEE 802.16 PKM Protocol using CasperFRD”, IEEE 2008. [11] Adibi,S., Lin, B., Ho,P., Agnew,G., Erfani, S. (2006), ”Authentication Authorization and Accounting (AAA) Schemes in Wimax”, Electro/information Technology, 2006 IEEE International Conference on 7-10 May. [12] Introduction to Network Simulator NS2_c 2009 Springer Science Business Media, e-ISBN: 978-0-387-71760-9