In this paper, a modified SAFER plus algorithm is presented. Additionally, a comparison with various security algorithms like pipelined AES, Triple DES, Elliptic curve Diffie Hellman and the existing SAFER plus are done. Performance of the algorithms is evaluated based on the data throughput, frequency and security level. The results show that the modified SAFER plus algorithm has enhanced security compared to the existing algorithms.
Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
Authentication and Key Agreement in 3GPP Networks csandit
The document summarizes authentication and key agreement in 3GPP networks. It discusses the LTE/SAE 4th generation network security architecture, including the key hierarchy and derivation. The authentication and key agreement protocol in EPS (EPS AKA) is also summarized, which involves mutual authentication between the network and UE to establish a shared key for secure communication.
This document discusses security issues in wireless cellular networks. It covers 4 generations of cellular networks and outlines limitations of wireless networks compared to wired networks. Some key security issues addressed include authentication, integrity, confidentiality, and various types of attacks such as unauthorized access, eavesdropping, and man-in-the-middle attacks. The document also notes that 3G networks provide features to enhance security but that continued research is needed to address new issues and further improve security as cellular technologies advance.
Wireless networks are vulnerable to several security threats. Unauthorized users can access networks through accidental or malicious association if wireless networks have poor security settings like default SSIDs and no encryption. Ad-hoc peer-to-peer networks between devices also lack protections. Attackers can perform man-in-the-middle attacks using rogue access points or spoof MAC addresses to steal network access. Organizations need policies and training to secure wireless networks and prevent identity theft and unauthorized access.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
Secured smart system desing in pervasive computing environment using vcsijujournal
The document summarizes a research paper on securing a smart home system using pervasive computing. It proposes a new security algorithm that uses public-key encryption, biometric security, and visual cryptography schemes. The algorithm authenticates users through biometric identification and one-time passwords. It then generates a visual cryptography share that is used to securely open the digital door lock and activate smart home sensors. The system provides remote monitoring and control through GSM networks and alerts authorized users if unauthorized people enter the home. The paper demonstrates the implementation of the secured smart home system and concludes the algorithm provides strong authentication and security for pervasive computing environments.
S ECURED S MART S YSTEM D ESING IN P ERVASIVE C OMPUTING E NVIRONMENT U...ijujournal
Ubiquitous
Computing
use
s
mobile
phones
or tiny devices for application
development with sensors
embedded in
mobile
phones.
The information generated by these devices is a big task in collection and
storage.
F
or f
urther, the data
transmission
to the
intended destination i
s delay tolerant
.
In this paper, we
made an attempt to propose a new security algorithm for providing security to
Pervasive Computing
E
nvironment
(PCE)
system using Public
-
key Encryption
(PKE)
algorithm, Biometric
S
ecurity
(BS)
algorithm and Visual Cryptography
Scheme (VCS)
algorithm.
In the proposed PCE monitoring system it
automates various home appliances using VCS and also provides security against intrusion using Zigbee
IEEE 802.15.4 based Sensor Network, GSM and Wi
-
Fi net
works are embedded through a standard Home
gateway.
This document summarizes security attacks on routing protocols in mobile ad hoc wireless networks. It discusses characteristics of ad hoc networks, including dynamic network topology and fluctuating link capacity. It describes problems with routing protocols, such as energy consumption and rapid node movement. It also outlines various security attacks like passive eavesdropping and active attacks that modify or inject false packets. Finally, it examines security solutions for ad hoc networks, including the Security Aware Ad Hoc Routing protocol, Authenticated Routing for Ad Hoc Networks protocol, and Cooperation of Nodes Fairness in Dynamic Ad-hoc NeTworks protocol.
Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
Authentication and Key Agreement in 3GPP Networks csandit
The document summarizes authentication and key agreement in 3GPP networks. It discusses the LTE/SAE 4th generation network security architecture, including the key hierarchy and derivation. The authentication and key agreement protocol in EPS (EPS AKA) is also summarized, which involves mutual authentication between the network and UE to establish a shared key for secure communication.
This document discusses security issues in wireless cellular networks. It covers 4 generations of cellular networks and outlines limitations of wireless networks compared to wired networks. Some key security issues addressed include authentication, integrity, confidentiality, and various types of attacks such as unauthorized access, eavesdropping, and man-in-the-middle attacks. The document also notes that 3G networks provide features to enhance security but that continued research is needed to address new issues and further improve security as cellular technologies advance.
Wireless networks are vulnerable to several security threats. Unauthorized users can access networks through accidental or malicious association if wireless networks have poor security settings like default SSIDs and no encryption. Ad-hoc peer-to-peer networks between devices also lack protections. Attackers can perform man-in-the-middle attacks using rogue access points or spoof MAC addresses to steal network access. Organizations need policies and training to secure wireless networks and prevent identity theft and unauthorized access.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
Secured smart system desing in pervasive computing environment using vcsijujournal
The document summarizes a research paper on securing a smart home system using pervasive computing. It proposes a new security algorithm that uses public-key encryption, biometric security, and visual cryptography schemes. The algorithm authenticates users through biometric identification and one-time passwords. It then generates a visual cryptography share that is used to securely open the digital door lock and activate smart home sensors. The system provides remote monitoring and control through GSM networks and alerts authorized users if unauthorized people enter the home. The paper demonstrates the implementation of the secured smart home system and concludes the algorithm provides strong authentication and security for pervasive computing environments.
S ECURED S MART S YSTEM D ESING IN P ERVASIVE C OMPUTING E NVIRONMENT U...ijujournal
Ubiquitous
Computing
use
s
mobile
phones
or tiny devices for application
development with sensors
embedded in
mobile
phones.
The information generated by these devices is a big task in collection and
storage.
F
or f
urther, the data
transmission
to the
intended destination i
s delay tolerant
.
In this paper, we
made an attempt to propose a new security algorithm for providing security to
Pervasive Computing
E
nvironment
(PCE)
system using Public
-
key Encryption
(PKE)
algorithm, Biometric
S
ecurity
(BS)
algorithm and Visual Cryptography
Scheme (VCS)
algorithm.
In the proposed PCE monitoring system it
automates various home appliances using VCS and also provides security against intrusion using Zigbee
IEEE 802.15.4 based Sensor Network, GSM and Wi
-
Fi net
works are embedded through a standard Home
gateway.
This document summarizes security attacks on routing protocols in mobile ad hoc wireless networks. It discusses characteristics of ad hoc networks, including dynamic network topology and fluctuating link capacity. It describes problems with routing protocols, such as energy consumption and rapid node movement. It also outlines various security attacks like passive eavesdropping and active attacks that modify or inject false packets. Finally, it examines security solutions for ad hoc networks, including the Security Aware Ad Hoc Routing protocol, Authenticated Routing for Ad Hoc Networks protocol, and Cooperation of Nodes Fairness in Dynamic Ad-hoc NeTworks protocol.
As sensor networks edge closer towards wide-spread placement, security issues become a central concern. So far, much research has concentrated on making sensor networks feasible and useful, and has not focused on security.
We present a set of security building blocks optimized for resource constrained environments and wireless communication. SPINS has two secure building blocks: SNEP and TESLA. SNEP provides the following important baseline security primitives: Data confidentiality, two-party data authentication, and data freshness. A particularly hard problem is to provide effective broadcast authentication, which is an important mechanism for sensor networks. TESLA is a new protocol which provides authenticated broadcast for severely resource-constrained surroundings. We realized the above protocols, and show that they are practical straighly on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we prove that the suite can be used for building higher level protocols
Framework for wireless network security using quantum cryptographyIJCNCJournal
Data that is transient over an unsecured wireless network is always susceptible to being intercepted by
anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s
information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the network by encoding
information as polarized photons, which can be sent through the air. This paper explores on the aspect of
application of quantum cryptography in wireless networks.
In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys.
The document provides an overview of wireless network and mobile device security. It discusses some key factors that contribute to higher security risks for wireless networks compared to wired networks, including the wireless channel, mobility, limited device resources, and accessibility. It also describes common wireless network threats like accidental association, man-in-the-middle attacks, denial of service attacks, and network injection. The document then discusses measures to secure wireless transmissions and access points. It outlines security threats specific to mobile devices like lack of physical security controls and use of untrusted networks and applications. Finally, it provides an overview of IEEE 802.11 wireless LAN security standards including WEP, WPA, RSN, and the phases of 802.
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
A vital technology in the next-generation cellular network is device-to-device (D2D) communication. Cellular user enabled with D2D communication provides high spectral efficiency and further increases the coverage area of the cell, especially for the end-cell users and blind spot areas. However, the implementation of D2D communication increases interference among the cellular and D2D users. In this paper, we proposed a radio resource allocation (RRA) algorithm to manage the interference using fractional frequency reuse (FFR) scheme and Hungarian algorithm. The proposed algorithm is divided into three parts. First, the FFR scheme allocates different frequency bands among the cell (inner and outer region) for both the cellular and the D2D users to reduce the interference. Second, the Hungarian weighted bipartite matching algorithm is used to allocate the resources to D2D users with the minimum total system interference, while maintaining the total system sum rate. The cellular users share the resources with more than one D2D pair. Lastly, the local search technique of swapping is used for further allocation to minimize the interference. We implemented two types of assignments, fair multiple assignment, and restricted multiple assignment. We compared our results with existing algorithms which verified that our proposed algorithm provides outstanding results in aspects like interference reduction and system sum rate. For restricted multiple assignment, 60-70% of the D2D users are allocated in average cases.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
Abstract: In this research paper ,we developed a model for a large network, wireless nodes are interconnected and each can be considered as a node processor that offer services to other node processors connected to a specific network. A very high proportion of the nodes that offer services need to carry out an authentication process so as to make an access request to the node offering the service. In this context, an integrated reconfigurable network security architecture moved to the application layer has become the need of the day for secure wireless data sharing. The security schemes of the seven layer OSI architecture need to be placed intrinsically in the wireless node itself and should be capable of supporting the MAC layer, IP address based layer and the routing protocols of the network layer. This work focuses on the use of emulator and embedded hardware architectures for wireless network security. In this work, the individual nodes can have a unique security signature pattern maintained by respective wireless nodes using an encryption algorithm and this is made dynamic. The metrics includes latency, throughput, Scalability, Effects of data transfer operation on node processor and application data located in the processor Keywords:Wireless Network security, Embedded hardware, Reconfigurable architecture, blowfish algorithm
This document discusses the importance of cryptography standards in wireless local area networks (WLANs). It begins by explaining how wireless networks are vulnerable to threats like eavesdropping, tampering, and denial of service attacks due to the open nature of wireless communication. It then examines some common wireless security protocols like WEP, WPA, and RSN and compares their features to provide insight for securing WLANs. Finally, it discusses some basic hardware requirements for setting up a local wireless network, including a wireless access point and network interface cards for devices to connect to the network securely.
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
AES is considered a good encryption algorithm in terms of providing security to a network in passing information (data) in form of audio, string, and video and in any other form. However it yields a low throughput resulting in slowness and increasing energy dispensation of server or an application. The Enhanced AES algorithm is proposed in this paper which works by using sequence counters and provides improved throughput as compare to conventional AES algorithm. The J-Bit Encoding is being a compression algorithm in lossless category which doesn't decrease the quality but reduce the size of data to some extent. It has been observed that the proposed encryption algorithm integrated to J-Bit Encoding algorithm will provide the effective security measures as well as increased throughput as a parameter and less bandwidth usage as the actual size of data shall not be sent along the network.
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EEIJCI JOURNAL
ZigBee is one of the most widely used wireless comm
unication technologies. ZigBee is being widely used
for sensor communications and many other research f
ields. Why consider ZigBee? Because it is cheap and
has better compatibility when compared to other com
munication technologies. We have given a detailed
description on comparison between all the available
technologies. In this paper, we have discussed so
me
basic concepts about ZigBee and its security aspect
s in networking. We have also listed out the major
manufacturers who are into the production of the tr
ansceivers for ZigBee
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
This document discusses encryption and decryption techniques using Bluetooth proximity on mobile devices. It begins with an abstract that outlines using an encryption algorithm to convert meaningful file information into unintelligible data that cannot be read without decrypting. The encryption key would be the Bluetooth MAC address of a registered device.
The introduction explains using AES encryption to encode files into unreadable data, with the Bluetooth MAC address as the decryption key. It also discusses how encryption provides data security for wireless communication.
The document then reviews cryptography purposes like authentication and confidentiality. It examines symmetric key cryptography using the same key for encryption and decryption, and public key cryptography using different keys. It also defines plain text, cipher text, and encryption/
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Survey of Security and Privacy Issues of Internet of ThingsEswar Publications
This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...IJERA Editor
The past several years have witnessed a rapid development in the wireless network area. So far wireless networking has been focused on high-speed and long range applications. Zigbee technology was developed for a Wireless Personal Area Networks (WPAN), aimed at control and military applications with low data rate and low power consumption. Zigbee is a standard defines the set of communication protocols for low-data-rate short-range wireless networking. Zigbee-based wireless devices operate in 868 MHz, 915 MHz, and 2.4 GHz frequency bands. The maximum data rate is 250K bits per second. Zigbee is mainly for battery-powered applications where low data rate, low cost, and long battery life are main requirements. This paper explores Verilog design for various blocks in Zigbee Transmitter architecture for an acknowledgement frame. The word digital has made a dramatic impact on our society. Developments of digital solutions have been possible due to good digital system design and modeling techniques. Further developments have been made and introduced VLSI in order to reduce size of the architecture, to improve speed of operation, improvements in predictability of the circuit behavior. Digital Zigbee Transmitter comprises of Cyclic Redundancy Check, Bit-to-Symbol block, Symbol-to-chip block, Modulator and Pulse shaping block. The work here is to show how we can design Zigbee transmitter with its specifications by using Verilog with less number of slices and Look up tables (LUTs).
1. The document proposes a privacy-preserving routing protocol called USOR for mobile ad hoc networks that achieves content unobservability. USOR uses anonymous key establishment based on group signatures and establishes secret session keys between nodes.
2. USOR performs an unobservable route discovery process to find routes to destinations. It establishes anonymous keys between nodes without nodes knowing each other's identities. This prevents attacks while achieving key confirmation.
3. USOR pads all packets to achieve strong privacy protection and resistance to attacks from compromised nodes. It provides better anonymity, unobservability and unlinkability than existing schemes like MASK.
A comparitive analysis of wireless security protocols (wep and wpa2)pijans
Wireless local area networks (WLANs) are become popular as they are fast, cost effective, flexible and easy
to use. There are some challenges of security and for IT administrators the choice of security protocol is a
critical issue. The main motive of this paper is to make the non-specialist reader knowledgeable about
threats in the wireless security and make them aware about the disadvantages of wireless security
protocols. WEP (Wired Equivalent privacy), WPA (Wi-Fi Protected Access) and RSN (Robust Security
Network) security protocols are defined and examined here. This security protocols are compared with the
common.
This paper is a comparative analysis of WEP, WPA and WPA2. We have tried to perform and check
authentication of all 3 protocols by implying the legendary attack vector scripts i.e. Air crack set of tools.
The test was conducted on Back Track operating system which is considered as dedicated pentesting
operating system. In the test result, we found out that WEP is the weakest, to which WPA was a temporary
solution and WPA2 is a very solid and long term solution.
This paper is a mixture of wireless security weaknesses and counter measures to the problems faced until
recently. After reading this paper the non specialist reader will have complete review and awareness about
the wireless security and vulnerabilities involved with it.
Bluetooth is a wireless technology standard that allows short-range exchange of data between fixed and mobile devices over short distances using radio transmissions. It was originally developed in 1994 as a cable replacement technology. The Bluetooth specifications have evolved through several versions with improvements in speed and functionality. Bluetooth devices operate within piconets, and multiple piconets can be interconnected to form scatternets. The Bluetooth protocol stack includes various layers like the radio, baseband, link manager, and L2CAP layers to manage connections and transfer of data packets. Bluetooth provides advantages like wireless connectivity and ease of use but also has limitations such as short range and potential security issues.
Bluetooth is a wireless technology standard for exchanging data over short distances. It allows for data transmission between devices like computers, phones, and other peripherals. Bluetooth operates using radio waves in the unlicensed 2.4GHz spectrum in a process called frequency-hopping spread spectrum. It establishes short-range radio links called piconets that allow for both point-to-point and point-to-multipoint connections.
The document discusses Bluetooth technology. It provides an overview of Bluetooth, including its history and development. The key points are:
- Bluetooth was developed in 1994 as a wireless standard to replace wired cables and enable communication between nearby electronic devices.
- It uses short-range radio transmissions in the 2.4GHz spectrum for data transfer between devices within about 10 meters of each other.
- The Bluetooth standard defines protocols and procedures for device discovery, connection establishment, and data and voice transfer between paired devices.
- Common applications of Bluetooth include wireless headphones, medical devices, sports sensors, and connecting computers, phones and other consumer electronics without cables.
- The technology aims to provide secure, low
As sensor networks edge closer towards wide-spread placement, security issues become a central concern. So far, much research has concentrated on making sensor networks feasible and useful, and has not focused on security.
We present a set of security building blocks optimized for resource constrained environments and wireless communication. SPINS has two secure building blocks: SNEP and TESLA. SNEP provides the following important baseline security primitives: Data confidentiality, two-party data authentication, and data freshness. A particularly hard problem is to provide effective broadcast authentication, which is an important mechanism for sensor networks. TESLA is a new protocol which provides authenticated broadcast for severely resource-constrained surroundings. We realized the above protocols, and show that they are practical straighly on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we prove that the suite can be used for building higher level protocols
Framework for wireless network security using quantum cryptographyIJCNCJournal
Data that is transient over an unsecured wireless network is always susceptible to being intercepted by
anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s
information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the network by encoding
information as polarized photons, which can be sent through the air. This paper explores on the aspect of
application of quantum cryptography in wireless networks.
In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys.
The document provides an overview of wireless network and mobile device security. It discusses some key factors that contribute to higher security risks for wireless networks compared to wired networks, including the wireless channel, mobility, limited device resources, and accessibility. It also describes common wireless network threats like accidental association, man-in-the-middle attacks, denial of service attacks, and network injection. The document then discusses measures to secure wireless transmissions and access points. It outlines security threats specific to mobile devices like lack of physical security controls and use of untrusted networks and applications. Finally, it provides an overview of IEEE 802.11 wireless LAN security standards including WEP, WPA, RSN, and the phases of 802.
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
A vital technology in the next-generation cellular network is device-to-device (D2D) communication. Cellular user enabled with D2D communication provides high spectral efficiency and further increases the coverage area of the cell, especially for the end-cell users and blind spot areas. However, the implementation of D2D communication increases interference among the cellular and D2D users. In this paper, we proposed a radio resource allocation (RRA) algorithm to manage the interference using fractional frequency reuse (FFR) scheme and Hungarian algorithm. The proposed algorithm is divided into three parts. First, the FFR scheme allocates different frequency bands among the cell (inner and outer region) for both the cellular and the D2D users to reduce the interference. Second, the Hungarian weighted bipartite matching algorithm is used to allocate the resources to D2D users with the minimum total system interference, while maintaining the total system sum rate. The cellular users share the resources with more than one D2D pair. Lastly, the local search technique of swapping is used for further allocation to minimize the interference. We implemented two types of assignments, fair multiple assignment, and restricted multiple assignment. We compared our results with existing algorithms which verified that our proposed algorithm provides outstanding results in aspects like interference reduction and system sum rate. For restricted multiple assignment, 60-70% of the D2D users are allocated in average cases.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
Abstract: In this research paper ,we developed a model for a large network, wireless nodes are interconnected and each can be considered as a node processor that offer services to other node processors connected to a specific network. A very high proportion of the nodes that offer services need to carry out an authentication process so as to make an access request to the node offering the service. In this context, an integrated reconfigurable network security architecture moved to the application layer has become the need of the day for secure wireless data sharing. The security schemes of the seven layer OSI architecture need to be placed intrinsically in the wireless node itself and should be capable of supporting the MAC layer, IP address based layer and the routing protocols of the network layer. This work focuses on the use of emulator and embedded hardware architectures for wireless network security. In this work, the individual nodes can have a unique security signature pattern maintained by respective wireless nodes using an encryption algorithm and this is made dynamic. The metrics includes latency, throughput, Scalability, Effects of data transfer operation on node processor and application data located in the processor Keywords:Wireless Network security, Embedded hardware, Reconfigurable architecture, blowfish algorithm
This document discusses the importance of cryptography standards in wireless local area networks (WLANs). It begins by explaining how wireless networks are vulnerable to threats like eavesdropping, tampering, and denial of service attacks due to the open nature of wireless communication. It then examines some common wireless security protocols like WEP, WPA, and RSN and compares their features to provide insight for securing WLANs. Finally, it discusses some basic hardware requirements for setting up a local wireless network, including a wireless access point and network interface cards for devices to connect to the network securely.
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
AES is considered a good encryption algorithm in terms of providing security to a network in passing information (data) in form of audio, string, and video and in any other form. However it yields a low throughput resulting in slowness and increasing energy dispensation of server or an application. The Enhanced AES algorithm is proposed in this paper which works by using sequence counters and provides improved throughput as compare to conventional AES algorithm. The J-Bit Encoding is being a compression algorithm in lossless category which doesn't decrease the quality but reduce the size of data to some extent. It has been observed that the proposed encryption algorithm integrated to J-Bit Encoding algorithm will provide the effective security measures as well as increased throughput as a parameter and less bandwidth usage as the actual size of data shall not be sent along the network.
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EEIJCI JOURNAL
ZigBee is one of the most widely used wireless comm
unication technologies. ZigBee is being widely used
for sensor communications and many other research f
ields. Why consider ZigBee? Because it is cheap and
has better compatibility when compared to other com
munication technologies. We have given a detailed
description on comparison between all the available
technologies. In this paper, we have discussed so
me
basic concepts about ZigBee and its security aspect
s in networking. We have also listed out the major
manufacturers who are into the production of the tr
ansceivers for ZigBee
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
This document discusses encryption and decryption techniques using Bluetooth proximity on mobile devices. It begins with an abstract that outlines using an encryption algorithm to convert meaningful file information into unintelligible data that cannot be read without decrypting. The encryption key would be the Bluetooth MAC address of a registered device.
The introduction explains using AES encryption to encode files into unreadable data, with the Bluetooth MAC address as the decryption key. It also discusses how encryption provides data security for wireless communication.
The document then reviews cryptography purposes like authentication and confidentiality. It examines symmetric key cryptography using the same key for encryption and decryption, and public key cryptography using different keys. It also defines plain text, cipher text, and encryption/
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Survey of Security and Privacy Issues of Internet of ThingsEswar Publications
This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...IJERA Editor
The past several years have witnessed a rapid development in the wireless network area. So far wireless networking has been focused on high-speed and long range applications. Zigbee technology was developed for a Wireless Personal Area Networks (WPAN), aimed at control and military applications with low data rate and low power consumption. Zigbee is a standard defines the set of communication protocols for low-data-rate short-range wireless networking. Zigbee-based wireless devices operate in 868 MHz, 915 MHz, and 2.4 GHz frequency bands. The maximum data rate is 250K bits per second. Zigbee is mainly for battery-powered applications where low data rate, low cost, and long battery life are main requirements. This paper explores Verilog design for various blocks in Zigbee Transmitter architecture for an acknowledgement frame. The word digital has made a dramatic impact on our society. Developments of digital solutions have been possible due to good digital system design and modeling techniques. Further developments have been made and introduced VLSI in order to reduce size of the architecture, to improve speed of operation, improvements in predictability of the circuit behavior. Digital Zigbee Transmitter comprises of Cyclic Redundancy Check, Bit-to-Symbol block, Symbol-to-chip block, Modulator and Pulse shaping block. The work here is to show how we can design Zigbee transmitter with its specifications by using Verilog with less number of slices and Look up tables (LUTs).
1. The document proposes a privacy-preserving routing protocol called USOR for mobile ad hoc networks that achieves content unobservability. USOR uses anonymous key establishment based on group signatures and establishes secret session keys between nodes.
2. USOR performs an unobservable route discovery process to find routes to destinations. It establishes anonymous keys between nodes without nodes knowing each other's identities. This prevents attacks while achieving key confirmation.
3. USOR pads all packets to achieve strong privacy protection and resistance to attacks from compromised nodes. It provides better anonymity, unobservability and unlinkability than existing schemes like MASK.
A comparitive analysis of wireless security protocols (wep and wpa2)pijans
Wireless local area networks (WLANs) are become popular as they are fast, cost effective, flexible and easy
to use. There are some challenges of security and for IT administrators the choice of security protocol is a
critical issue. The main motive of this paper is to make the non-specialist reader knowledgeable about
threats in the wireless security and make them aware about the disadvantages of wireless security
protocols. WEP (Wired Equivalent privacy), WPA (Wi-Fi Protected Access) and RSN (Robust Security
Network) security protocols are defined and examined here. This security protocols are compared with the
common.
This paper is a comparative analysis of WEP, WPA and WPA2. We have tried to perform and check
authentication of all 3 protocols by implying the legendary attack vector scripts i.e. Air crack set of tools.
The test was conducted on Back Track operating system which is considered as dedicated pentesting
operating system. In the test result, we found out that WEP is the weakest, to which WPA was a temporary
solution and WPA2 is a very solid and long term solution.
This paper is a mixture of wireless security weaknesses and counter measures to the problems faced until
recently. After reading this paper the non specialist reader will have complete review and awareness about
the wireless security and vulnerabilities involved with it.
Bluetooth is a wireless technology standard that allows short-range exchange of data between fixed and mobile devices over short distances using radio transmissions. It was originally developed in 1994 as a cable replacement technology. The Bluetooth specifications have evolved through several versions with improvements in speed and functionality. Bluetooth devices operate within piconets, and multiple piconets can be interconnected to form scatternets. The Bluetooth protocol stack includes various layers like the radio, baseband, link manager, and L2CAP layers to manage connections and transfer of data packets. Bluetooth provides advantages like wireless connectivity and ease of use but also has limitations such as short range and potential security issues.
Bluetooth is a wireless technology standard for exchanging data over short distances. It allows for data transmission between devices like computers, phones, and other peripherals. Bluetooth operates using radio waves in the unlicensed 2.4GHz spectrum in a process called frequency-hopping spread spectrum. It establishes short-range radio links called piconets that allow for both point-to-point and point-to-multipoint connections.
The document discusses Bluetooth technology. It provides an overview of Bluetooth, including its history and development. The key points are:
- Bluetooth was developed in 1994 as a wireless standard to replace wired cables and enable communication between nearby electronic devices.
- It uses short-range radio transmissions in the 2.4GHz spectrum for data transfer between devices within about 10 meters of each other.
- The Bluetooth standard defines protocols and procedures for device discovery, connection establishment, and data and voice transfer between paired devices.
- Common applications of Bluetooth include wireless headphones, medical devices, sports sensors, and connecting computers, phones and other consumer electronics without cables.
- The technology aims to provide secure, low
Bluetooth is a wireless technology standard that allows for short-range data transmission between devices like computers, mobile phones, and other peripherals. It uses radio waves to replace wired connections like cables. The document discusses Bluetooth's history, specifications including supported data rates and frequency bands, operation principles, security concerns and attacks, and compares it to other wireless technologies like Wi-Fi. It concludes that Bluetooth enables convenient wireless connections between devices for transferring small amounts of data over short distances.
Bluetooth technology is a short-range wireless standard intended to replace wired connections between devices within about 30 feet of each other. It operates in the unlicensed 2.4GHz spectrum and supports data rates of 1-3 Mbps. Bluetooth devices are classified based on their range, with Class 1 having the longest range of up to 100 meters. Security is a priority in Bluetooth, with three different security modes defined to protect data being transmitted between devices.
AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...cscpconf
Bluetooth is a short range, low power, low cost wireless communication technology designed to connect phones, laptops and PDAs. The greater availability of portable devices with Bluetooth connectivity imposes wireless connection between enabled devices. This paper considers the problems of Bluetooth communication and also proposes a new expanded network to overcome the basic limitation of Bluetooth devices that is the range constraint. This creates a network of devices that will include laptops, set top devices and also mobile phones. The main purpose of this proposal is to establish a network will enable the users to communicate outside the range without any range constraint.
Mobile Networking and Ad hoc routing protocols validationIOSR Journals
This document discusses mobile networking and ad hoc routing protocols. It begins with an overview of cellular phone networks and their growth in usage. It then describes mobile ad hoc networks and some of the challenges in designing routing protocols for them. The document evaluates two model checking tools, SPIN and UPPAAL, and discusses their ability to verify properties of ad hoc routing protocols through formal validation methods.
Bluetooth is a short-range wireless communication technology that allows devices to connect without wires. It uses radio waves to transmit data between fixed or portable devices securely. Bluetooth devices can connect to form a piconet of up to seven devices connected to one master device or scatternet of multiple connected piconets. Bluetooth uses frequency hopping spread spectrum technology and adaptive frequency hopping to minimize interference. It has defined profiles for common applications and provides security modes to enforce link-level security. Common applications of Bluetooth include wireless headsets, input devices, file transfer between devices, and connecting devices in personal area networks.
The transport layer is responsible for host-to-host communication and provides services like reliable data transfer, flow control, and multiplexing. Common transport layer protocols include TCP and UDP, which provide connection-oriented and connectionless services respectively, and help applications exchange data over network layers. The transport layer sits above the network layer and below the application layer in network stacks.
Bluetooth is a wireless technology that allows electronic devices to communicate without wires. It uses radio waves to transmit data within a short range of up to 10 meters. Some key aspects of Bluetooth include:
- It operates using a master-slave architecture called a piconet, where one device acts as the master and can communicate with up to 7 slave devices. Multiple piconets can be connected to form a scatternet.
- Bluetooth versions have increased data transfer speeds over time, from 721 kbps in version 1.1 to 24 mbps in version 3.0.
- It uses less power than infrared (IR) technology and has no line-of-sight requirements between devices.
Bluetooth is a wireless technology standard that allows short-range wireless connections between devices like mobile phones, laptops, printers, and other electronics. The document provides an overview of Bluetooth including its history, how it works using frequency-hopping spread spectrum in the 2.4GHz band, supporting up to 10 meters of range. It discusses Bluetooth components, security modes, early slow product rollout, and potential business uses and benefits like replacing cables and wireless file sharing. Standards bodies like the Bluetooth SIG and key technology leaders are also mentioned.
This document is a presentation on Bluetooth technology given by group SE-I. It introduces Bluetooth technology and its history. It discusses Bluetooth standards and versions. It covers how Bluetooth works including frequency hopping, piconets, profiles and data rates. It discusses Bluetooth security, advantages and disadvantages. It describes uses of Bluetooth in various applications today and its future prospects. The presentation was given to the computer science and information technology department and included 5 group member contributions on different aspects of Bluetooth.
Bluetooth is a wireless technology that allows short-range connections between electronic devices like computers, phones, and other portable devices. It uses radio waves instead of wires to connect devices within about 30 feet of each other, eliminating the need for direct line-of-sight connections. A group of companies formed the Bluetooth Special Interest Group to develop the Bluetooth specifications and promote its use. While initially developed for business users, Bluetooth's ability to connect diverse devices wirelessly has led to its use in many consumer products as well.
Bluetooth and IEEE 802.15 are wireless personal area network (WPAN) technologies.
Bluetooth allows up to 8 devices to communicate in a piconet and 10 piconets can coexist. Each link is encoded for security.
IEEE 802.15.3 supports high data rate applications over short ranges, while 802.15.4 supports lower data rates for low power devices like sensors.
This document discusses security enhancements for IEEE 802.11i wireless networks. It proposes using physical layer information and channel-based secrets to improve authentication and key establishment. Specifically, it suggests modifying the 802.11i key derivation process to incorporate information-theoretic secure bits extracted from wireless channel measurements. This would make stolen credentials like passwords less useful, improving security. The document outlines integrating channel secrets into the pairwise transient key derivation in 802.11i to provide forward and backward secrecy.
Advanced Security Management in Metro Ethernet NetworksIJNSA Journal
With the rapid increase in bandwidth and the introduction of advanced IP services including voice, high-speed internet access, and video/IPTV, consumers are more vulnerable to malicious users than ever. In recent years, roviding safe and sound networks and services have been the zenith priority for service providers and network carriers alike. Users are hesitant to subscribe to new services unless service providers guarantee secure connections. More importantly, government agencies of many countries have introduced legislations requiring service providers to keep track and records of owners of IP and MAC addresses at all time. In this paper, we first present an overview of Metro Ethernet (or Ethernet-To-The-Home/Business (ETTx)) and compare with various IP broadband access technologies including DSL, wireless and cable. We then outline major security concerns for Metro Ethernet networks including network and subscriber/end user security. Next we introduce state-of-the-art algorithms to prevent attackers from stealing any IP or MAC addresses. Our proposal is to use network management in conjunction with hardware features for security management to provide a secure and spoofing-free ETTx network. The key idea behind our proposal is to utilize network management to enforce strict (port, MAC, IP) binding in the access network to provide subscriber security. The paper then proposes an adaptive policy-based security controller to quickly identify suspected malicious users, temporarily isolate them without disconnecting them from the network or validating their contracts, and then carry the required analysis. The proposed controller identifies malicious users without compromising between accurate but lengthy traffic analysis and premature decision. It also provides the ability to make granular corrective actions that are adaptive to any defined network condition.
This document provides an overview of Bluetooth technology. It discusses that Bluetooth allows for short-range wireless connectivity between devices to replace wired connections. The history of Bluetooth's invention in 1994 by Ericsson is outlined. Different types of Bluetooth devices are listed, along with advantages like mobility and eliminating wires, and disadvantages like slow data transfer rates and limited security. Applications and characteristics of Bluetooth are also summarized, and the future of Bluetooth technology is discussed.
Bluetooth is a wireless technology standard for exchanging data over short distances between fixed and mobile devices, creating personal area networks (PANs). It was created in 1994 by telecom vendor Ericsson. Bluetooth operates in the unlicensed 2.4 GHz short-range radio frequency band, using a frequency hopping spread spectrum technique to avoid interference. It defines a packet-based protocol with a master-slave structure, where one master communicates with up to 7 slaves in a piconet. Piconets can be connected to create larger scatternets. Bluetooth supports both point-to-point and point-to-multipoint connections.
A Novel Solution To The Short Range Bluetooth Communication pijans
Bluetooth is developed for short range communication. Bluetooth Devices are normally having low power
and low cost. This is a wireless communication technology designed to connect phones, laptops and PDAs.
The greater availability of portable devices with Bluetooth connectivity imposes wireless connection
between enabled devices. On an average the range of Bluetooth devices is about 10 meters.The basic
limitation of the Bluetooth communication is this range limitation. In this paper I have studied the
limitations of Bluetooth communication and consider range constraint as the major limitation. I propose a
new expanded Blue tooth network to overcome the range constraint of Bluetooth device. This creates a
network of Bluetooth enabled devices that will include laptops, set top devices and also mobile phones. The
main purpose of this proposal is to establish a network will enable the users to communicate outside the
range without any range constraint.
Similar to A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform for Bluetooth Technology (20)
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform for Bluetooth Technology
1. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
80
A Proposed SAFER Plus Security algorithm
using Fast Walsh Hadamard transform for
Bluetooth Technology
D.Sharmila1
, R.Neelaveni2
1
(Research Scholar),
Associate Professor,
Bannari Amman Institute of Technology, Sathyamangalam.
Tamil Nadu-638401.
sharmiramesh@rediffmail.com
2
Asst.Prof. PSG College of Technology,
Coimbatore.Tamil Nadu -638401.
rnv@eee.psgtech.ac.in
ABSTRACT
In this paper, a modified SAFER plus algorithm is
presented. Additionally, a comparison with various
security algorithms like pipelined AES, Triple DES,
Elliptic curve Diffie Hellman and the existing SAFER plus
are done. Performance of the algorithms is evaluated
based on the data throughput, frequency and security
level. The results show that the modified SAFER plus
algorithm has enhanced security compared to the existing
algorithms.
Key words: Secure And Fast Encryption Routine, Triple Data
Encryption Standard, Pipelined Advanced Encryption
Standard, Elliptic Curve Diffie Hellmann, Pseudo Hadamard
Transform, Encryption and Decryption.
1. Introduction
Bluetooth technology was developed to replace
cumbersome wires in portable and personal electronic devices
with radio frequency wireless communication. It has since
found its way into numerous mobile applications as well as
home and automobile use. Bluetooth is an open standard for
short-range radio frequency (RF) communication. Bluetooth
technology is used primarily to establish wireless personal
area networks (WPAN), commonly referred to as ad hoc or
peer-to-peer (P2P) networks. This allows users to form ad hoc
networks between a wide variety of devices to transfer voice
and data. There have been several versions of Bluetooth, with
the most recent being 2.0 + Enhanced Data Rate (EDR)
(November 2004) and 2.1 + EDR (July 2007). While 2.0 +
EDR provided faster transmission speeds than previous
versions (up to 3 Mbits/second), 2.1 + EDR provides a
significant security improvement for link key generation and
management in the form of Secure Simple Pairing (SSP).
Bluetooth is a technology for short range wireless data and
realtime two-way voice transfer providing data rates up to 3
Mb/s. It operates at 2.4 GHz frequency in the free ISM-band
(Industrial, Scientific, and Medical) using frequency hopping
[18]. Bluetooth can be used to connect almost any kind of
device to another device. Typical range of Bluetooth
communication varies from 10 to 100 meters indoors.
Bluetooth technology and associated devices are susceptible
to general wireless networking threats, such as denial of
service attacks, eavesdropping, man-in-the-middle attacks,
message modification, and resource misappropriation. They
are also threatened by more specific Bluetooth-related attacks
that target known vulnerabilities in Bluetooth
implementations and specifications. Attacks against
improperly secured Bluetooth implementations can provide
attackers with unauthorized access to sensitive information
and unauthorized usage of Bluetooth devices and other
systems or networks to which the devices are connected. [1]
There are several security algorithms available to ensure
the security in wireless network devices. Some of the major
methods are AES, DES, Triple DES, IDEA, BLOWFISH,
SAFER+,ECDH etc. The SAFER+ algorithm is based on the
existing SAFER family of ciphers. Although SAFER+ is the
most widely used algorithm, it seems to have some
vulnerabilities. The objective is to compare the various
security algorithms like pipelined AES[14], triple DES
[15][16], Elliptic Curve Diffie Hellman (ECDH), Existing
SAFER+ and Proposed SAFER+ algorithm The Proposed
SAFER+ algorithm has rotation block between every round
of Existing SAFER+, PHT is replaced by Fast Psuedo
Hadaamard transform (FPHT) and first round inputs are
added or ored with the third round inputs and fifth round
inputs are added or ored with the seventh round inputs. Thus
the proposed SAFER+ has higher data throughput and
frequency. This proves that proposed SAFER+ algorithm has
better data throughput and frequency than the existing
algorithms.
In this paper, section 2 describes the overview of
Bluetooth technology and security. section 3 deals with the
Existing SAFER+ algorithm. The Proposed SAFER+
2. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
81
algorithm is explained in section 4. A section 5 deal with the
results, Section 6 refers the conclusion.
2. Bluetooth Security Architecture
Bluetooth architecture is described in Section 2.1.
Section 2.2 explains the Bluetooth security. Bluetooth
protocols are briefly described in Section 2.3
2.1 Bluetooth Architecture
Connection types define the possible ways Bluetooth
devices can exchange data. Bluetooth has three connection
types: ACL (Asynchronous Connection-Less), SCO
(Synchronous Connection-Oriented) and eSCO. ACL links
are for symmetric (maximum of 1306.9 kb/s for both
directions) or asymmetric (maximum of 2178.1 kb/s for send
and 177.1 kb/s for receive) data transfer. Retransmission of
packets is used to ensure integrity of data. SCO links are
symmetric (maximum of 64 kb/s for both directions) and they
are used for transferring realtime two-way voice.
Retransmission of voice packets is not used. Therefore, when
the channel BER is high, voice can be distorted. eSCO links
are also symmetric (maximum of 864 kb/s for both directions)
and they are used for transferring realtime two-way voice.
Retransmission of packets is used to ensure the integrity of
data (voice). Because retransmission of packets is used, eSCO
links can also carry data packets, but they are mainly used for
realtime two-way voice. Only Bluetooth 1.2 or 2.0+EDR
devices can use eSCO links, but SCO links must also be
supported to provide backward-compatibility. Bluetooth
devices that communicate with each other form a piconet. The
device that initiates a connection is the piconet master. One
piconet can have maximum of seven active slave devices and
one master device. All communication within a piconet goes
through the piconet master. The clock of the piconet master
and frequency hopping information are used to synchronize
the piconet slaves with the master. Two or more piconets
together form a scatternet, which can be used to
eliminate Bluetooth range restrictions. Scatternet
environment requires that different piconets must have a
common device, so-called scatternet member, to relay data
between the piconets. [7] [8] [9].
The design goals for Bluetooth technology have been
simplicity, compatibility, inexpensive and compact
microchips, fast data transfer, globality, secure
communication, and low power consumption. Simplicity
means that a Bluetooth device must be as easy as possible to
use for a user. Compatibility means manufacturer-
independent interoperability between different Bluetooth
devices, and it also means backward-compatibility with older
Bluetooth versions. Bluetooth microchips are also very
compact (roughly 5 mm × 5 mm of size) and cheap (roughly
2.50 dollars per microchip [Blu06d, Tan06]). The latest
public version of Bluetooth specification, Bluetooth
2.0+EDR, supports data rates up to 3 Mb/s. The future
version of Bluetooth specification (Seattle) is expected to
provide data rates up to 480 Mb/s. Globality means that
Bluetooth can be used all over the world using the same free
ISM-band. Bluetooth has built-in security measures at the link
level to provide the secure communication for the piconet.
Bluetooth microchips have also low power consumption and
therefore they are widely used in many different kinds of
mobile devices. [17][19]
2.2 Bluetooth Security
This section provides Bluetooth specifications to illustrate
their limitations and provide a foundation for some of the
security recommendations A high-level example of the
scope of the security for the Bluetooth radio path is depicted
in Figure 2. In this example, Bluetooth security is provided
only between the mobile phone and the laptop computer,
while IEEE 802.11 security protects the wireless local area
network link between the laptop and the IEEE 802.11 AP.
However, the communications on the wired network are not
protected by Bluetooth or IEEE 802.11 security capabilities.
End-to-end security is not possible without using higher-layer
security solutions in addition to the security features included
in the Bluetooth specification and IEEE 802.11 standards. [2]
The following are the three basic security services specified
in the Bluetooth standard:
Authentication: verifying the identity of communicating
devices. User authentication is not provided natively by
Bluetooth.
Confidentiality: preventing information compromise caused
by eavesdropping by ensuring that only authorized devices
can access and view data.
Authorization: allowing the control of resources by ensuring
that a device is authorized to use a service before permitting it
to do so.
The three security services offered by Bluetooth and details
about the modes of security are described below. Bluetooth
does not address other security services such as audit and
non-repudiation; if such services are needed, they must be
provided through additional means.
Figure1 Bluetooth Air-Interface Security
2.2.1 Authentication
The Bluetooth device authentication procedure is in
the form of a challenge-response scheme. Each device
interacting in an authentication procedure is referred to as
Laptop
Work
station
Printer
Switch
Server
IEEE
802.11
security
Cellpho
ne
Bluetooth Security
3. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
82
either the claimant or the verifier.[3] The claimant is the
device attempting to prove its identity, and the verifier is the
device validating the identity of the claimant. The challenge-
response protocol validates devices by verifying the
knowledge of a secret key—the Bluetooth link key. The
challenge-response verification scheme is depicted in Figure
2
The verifier transmits a 128-bit random challenge
(AU_RAND) to the claimant. The claimant uses the E1
algorithm to compute an authentication response using his
unique 48-bit Bluetooth device address (BD_ADDR), the link
key, and AU_RAND as inputs. The verifier performs the
same computation. Only the 32 most significant bits of the E
output are used for authentication purposes. The remaining
96 bits of the 128-bit output are known as the Authenticated
Ciphering Offset (ACO) value, which will be used later to
create the Bluetooth encryption key. The claimant returns the
most significant 32 bits of the E1 output as the computed
response, SRES, to the verifier. The verifier compares the
SRES from the claimant with the value that it computed. If
the two 32-bit values are equal, the authentication is
considered successful. If the two 32-bit values are not equal,
the authentication has failed. Performing these steps once
accomplishes one-way authentication. The Bluetooth
standard allows both one-way and mutual authentication to be
performed. For mutual authentication, the above process is
repeated with the verifier and claimant switching roles. [20]
Figure 2 Bluetooth Authentication
2.2.2 Confidentiality
In addition to the Security Modes, Bluetooth provides a
separate confidentiality service to thwart eavesdropping
attempts on the payloads of the packets exchanged between
Bluetooth devices. Bluetooth has three Encryption Modes,
but only two of them actually provide confidentiality. The
modes are as follows:
Encryption Mode 1—No encryption is performed on any
traffic.
Encryption Mode 2—individually addressed traffic is
encrypted using encryption keys based on individual link
keys; broadcast traffic is not encrypted.
Encryption Mode 3—All traffic is encrypted using an
encryption key based on the master link key. Encryption
Modes 2 and 3 use the same encryption mechanism
2.3 Bluetooth protocols
Bluetooth protocol stack is illustrated in Figure 2.
Protocols below HCI (Host Controller Interface) are built-in
to the Bluetooth microchip and protocols above HCI are
located as a part of the host device's software package. HCI is
needed between the hardware and software protocols. The
purpose of HCI is to enable manufacturer-independent
combining of Bluetooth chips (Host Controller) and the actual
host device. HCI takes care of security communication
between the host and Bluetooth module. [3]
Figure 3. Bluetooth protocol stack
Baseband and LMP (Link Manager Protocol) together enable
the physical RF connection. LC (Link Controller) is a state
machine that defines the current state of Bluetooth
device. Bluetooth device can be, for example, in low-
power mode for saving batteries, in the connected state
for normal piconet operation, or in the paging state for master
to bring new slaves to the piconet. LC has pseudorandom
number generation capability, the methods for managing
security keys, and capability for providing the needed
mathematical operations for authentication and encryption.
LM (Link Manager) acts as a liaison between the
application and the LC on the local device, and it also
communicates with the remote LM via PDUs (Protocol Data
Units) using the LMP, i.e. the LM communicates with three
different entities during a Bluetooth session: the local host
through HCI, the local LC (local operations), and the
Bluetooth Device 1
(Claimant)
Bluetooth Device 2
(Verifier)
Radio Interface
E1
Algorith
m
Link
Key
Authentication
Failed
Link
Key
Random Number Generator
Authentication
Successful
E1
Algorithm
=?
BD_ADDR
AU_RAND
Device address
AU_RAND
ACO
Yes No
ACO
4. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
83
remote LM (link configuration, link information, and link
management operations). The PDU is acknowledged at the
Baseband level, but it is acted upon by the LM. The local LM
usually resides on the Bluetooth module as a complete host-
module implementation. The remote LM can be defined as
the LM at the other end of the Bluetooth link. LM has also
several commands for handling security issues.
SCO and eSCO links are used for transferring realtime
two-way voice (see Section 2.1). They are established directly
from the Baseband level, so overhead of upper layer protocols
is not causing any delays for realtime two-way voice
connections.L2CAP (Logical Link Control and Adaptation
Protocol) is a software module that normally resides on the
host. It fits upper layer protocols to the Baseband, i.e. it acts
as a conduit for data on the ACL link between Baseband and
host applications. L2CAP also offers CO (Connection-
Oriented; from master to one slave and from slave to
master) and CL (Connection-Less; from master to multiple
slaves) services, and it is defined only for ACL links. Lower
layer protocols do not have to know how layers above
L2CAP work and vice versa. L2CAP can initiate security
procedures when a CO or a CL channel connection attempt is
made.
SDP (Service Discovery Protocol) is used to find the
services of Bluetooth devices in the range. RFCOMM (Radio
Frequency Communication) emulates serial ports over
L2CAP, and therefore it is possible to use existing serial port
applications via Bluetooth. OBEX (Object Exchange
Protocol) is used to exchange objects, such as calendar notes,
business cards and data files, between devices by using the
client-server model.
TCS (Telephony Control protocol Specification) binary
defines the call control signalling for the
establishment/release of speech and data calls between
Bluetooth devices. It also provides functionality for
exchanging signalling information that is unrelated to
ongoing calls. Many AT commands are also supported for
transmitting control signals for telephony control.[4]
BNEP (Bluetooth Network Encapsulation Protocol) is
used to provide networking capabilities for Bluetooth devices.
It allows that IP (Internet Protocol) packets can be carried in
the payload of L2CAP packets. IP is a network layer protocol
in the TCP/IP (Transmission Control Protocol / Internet
Protocol) protocol suite. It contains both addressing
information and some control information to enable routing
of packets. TCP is one of the transport layer core protocols
used in the TCP/IP protocol suite. It provides reliable
transmission of data in IP network. UDP (User Datagram
Protocol) is also one of the transport layer core protocols used
in the TCP/IP protocol suite. It provides unreliable
transmission of data in IP network, i.e. it does not provide
reliability, flow-control, or error-recovery functions to IP.
PPP (Point- to-Point Protocol) can also be used to provide
TCP/IP networking capabilities for Bluetooth devices, but it
is slower, i.e. it works over RFCOMM while BNEP works
directly over L2CAP, and therefore it is rarely used anymore.
3. Description of SAFER Plus Algorithm
The SAFER+ (Secure And Fast Encryption Routine)
algorithm is based on the existing SAFER family of ciphers,
which comprises the ciphers SAFER K-64, SAFER K-128,
SAFER SK-128. All algorithms are byte-oriented block
encryption algorithms, which are characterized by the
following two properties. First, they use a non-orthodox
linear transformation, which, is called Pseudo-Hadamard-
Transformation (PHT) for the desired diffusion, and second,
they use additive constant factors (Bias vectors) in the
scheduling for weak keys avoidance. [5]
It consists of two main units: the encryption data path
and the key-scheduling unit. The key-scheduling unit allows
on-the-fly computation of the round keys. To reduce the
silicon area, we used eight loops of a key scheduling single-
round implementation. Round keys are applied in parallel in
the encryption data path. The full Safer+ algorithm execution
requires eight loops of the single round. We chose the single-
round hardware implementation solution because, with this
minimum silicon area, we could achieve the required
throughput. The encryption data path’s first component is an
input register, which combines the plaintext and the feedback
data produced in the previous round. The input register feeds
the afer+ single round.
Figure.4 Safer + Implementation
K17
K2r-
/
Key
K
E
Y
S
C
H
E
D
U
L
I
N
G
Input Register
MUX
Key Odd
Addition
Safer Plus Single
round
Key Odd Addition
Output Register
Round
Keys
Round
key
128 Plain text
clock
When Sel=0
When Sel=1
F
E
E
D
B
A
C
K
D
A
T
A
Encryption
Data path 128
Cipher text
Reset
5. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
84
3.1 SAFER + Single round
A Safer+ single round has four subunits:
• The mixed XOR/addition subunit, which combines
data with the appropriate round sub key K2r–1.
• The non-linear layer (use of the non-linear functions
e and l). The e function is implemented as y = 45x in
GF(257), except that 45128 = 0. The l function is
implemented as y = log45(x) in GF(257), except that
log45(0) = 128.
• The mixed addition/XOR subunit, which combines
data with the round sub key K2r
• The four linear Pseudo-Hadamard Transformation
layers, connected through an “Armenian Shuffle”
permutation.
Figure5. SAFER+ single round
The implementation of the non-linear layer using a data-
mapping component that produces the X1 and X2 bytes is
done. These bytes are the input of the non-linear functions e
and l. During one round, we execute e and l eight times. This
design significantly reduces the required silicon area. Each
function is implemented using 256 bytes of ROM.
3.2 PHT Implementation
The design of PHT element is shown in Fig.6: The PHT
Implementation Multiplication by 2 can be achieved by one
bit left wired shift.
Figure 6 Psuedo Hadamard Transform
Out1=2 in1+in2 (1)
Out2=in1+in2 (2)
the four linear PHT layers connected through the
permutations. The permutation boxes show how input byte
indices are mapped into the output byte indices. Thus,
position 0 (leftmost) is mapped on position 8; position 1 is
mapped on position 11, etc.
4. Proposed SAFER Plus Algorithm
The Existing SAFER+ algorithm is modified to provide
higher data throughput and frequency. The modified SAFER+
algorithm has three modifications when compared to the
existing one.
(i) Rotation block is introduced between every
round. Rotation is towards left for encryption
and towards right for decryption
(ii) The input of round 1 and the output of round 2
are Xor/Add Modulo 16 byte-by-byte to form
the input of round 3. Similarly the input of
round 5 and the output of round 6 are Xor/Add
Modulo 16 byte-by-byte to form the input of
round 7.
(iii) Instead of PHT layer, Fast Walsh Hadamard
Transform (FWHT) is used.
The Encryption and the Decryption block diagrams are given
in the figure7 and figure 8.
Figure 8 Proposed SAFER+ for encryption
X
+ +
SHL 1
X 2 8 8
Out 1
Out 2
8
In 2
8
8 8
In 1
8
6. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
85
Figure 9 Proposed SAFER+ for Decryption
The proposed work is to replace the Pseudo Hadamard
Transform by Fast Walsh Hadamard transform.
Figure 10 Proposed SAFER+ single round
Figure 10 shows the proposed SAFER+ single round
architecture. In this, fast algorithms for Walsh Hadamard
Transform on sliding windows are used to implement pattern
matching most efficiently instead of PHT. The computational
requirement of the proposed algorithm is about 1.5 additions
per projection vector per sample which is the lowest among
existing fast algorithms for Walsh Hadamard Transform on
sliding windows.
4.1 Fast Algorithm for WHT
As any orthogonal (unitary) matrix can be used to define an
orthogonal (unitary) transform, we define a Walsh-Hadamard
transform of Hadamard order (WHTh) as
=
=
Hx
x
Hx
X
These are the forward and inverse transform pair.
[ ]T
1]
N
x[1],...x[
x[0],
x −
=
and
[ ]T
1]
N
X[1],...X[
X[0],
X −
= are the signal and spectrum
vectors, respectively. The Kth element of the transform can
also be written as
∏
∑ ∑
−
=
= =
−
=
=
1
0
1
-
N
0
m
1
-
N
0
m
)
1
(
x[m]
m]x[m]
h[k,
X[k]
n
i
k
m i
i
The complexity of WHT is O (N) 2.
Similar to FFT algorithm,
Fast WHT algorithm with complexity of O (Nlog2N) are
derived assume n=3 and N=2n
=8 in the following derivation.
An N=8 point WHTh of signal ]
[m
x is defined as
This equation can be separated into two parts [13]. The first
half of the X vector can be obtained as
-- (1)
Where
-- (2)
The second half of the X vector can be obtained as
7. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
86
-- (3)
where
-- (4)
Converting a WHT of size N=8 into two WHT of size N/2=4.
Continuing this process recursively, we can rewrite Eq. (1) as
the following (similar process for Eq. (3))
-- (5)
where
-- (6)
The second half is
-- (7)
where
-- (8)
X (4) through X (7) of the second half can be obtained
-- (9)
and
-- (10)
Summarizing the above steps of Equations (2), (4), (6), (8),
(9) and (10), we get the Fast WHT algorithm as illustrated
below.
Figure 11 Fast WHT algorithm
5. Results
Various existing algorithms are analyzed and compared with
the proposed algorithm based on the parameters such as
encryption frequency, Data throughput and security level and
the results are shown in the bar charts.
99
88.33
78.08
65.44
37.19
0
20
40
60
80
100
120
Triple DES Pipelined AES ECDH Safer Plus Efficient
Proposed Safer
Plus
ALGORITHM
ENCRYPTION
TIME(ms)
Figure 12 Encryption Time Vs Various Algorithms
Based on the analysis, the modified Safer Plus algorithm
required minimum encryption time and maximum encryption
frequency when compared to all the existing algorithms due
to the inclusion of FWHT instead of PHT layer as shown in
Figure 12 and Figure 13.
10.1
12.56
14.82
16.63
26.88
0
5
10
15
20
25
30
Triple DES Pipelined
AES
ECDH Safer Plus Efficient
Proposed
Safer Plus
ALGORITHM
ENCRYPTION
FREQUENCY(Kilo
Hz)
Figure 13 Encryption Frequency Vs Various Algorithms
The number of hits required to attack the various algorithms
is also compared and shown in Figure14. The security level is
much enhanced for the algorithm proposed since the number
of hits is found to be maximum due to the introduction of the
rotation block between every round.
COMPARISON
943999
688787 722519
873736
1605882
0
200000
400000
600000
800000
1000000
1200000
1400000
1600000
1800000
Triple DES Pipelined AES ECDH Safer Plus Efficient
Proposed Safer
Plus
ALGORITHM
HITS
COUNT
FOR
ATTACKS
Figure 14 No. of Hit counts Vs Various algorithms
8. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
87
46.63
52.68
59.19
67.11
124.14
0
20
40
60
80
100
120
140
Triple DES Pipelined AES ECDH Safer Plus Efficient
Proposed
Safer Plus
ALGORITHM
DATA
THROUGHPUT(Bytes)
Figure 15 Data throughput Vs various algorithm
Figure 15 shows that modified Safer plus algorithm has
higher data throughput comparatively because the input of
round 1 and the output of round 2 are Xor/Add operation to
form the input of round 3.
0
20
40
60
80
100
120
140
Triple DES Pipelined AES ECDH Safer Plus Efficient Proposed
Safer Plus
ALGORITHM
C
O
M
P
A
R
I
S
O
N
ENCRYPTION TIME(ms)
ENCRYPTION FREQUENCT(Kilo Hz)
DATA THROUGHPUT(Bytes)
Figure 16 Encryption time, Encryption frequency and data
throughput Vs various algorithms
Figure16 consolidates the performance of the proposed
algorithm. It is observed that the modified Safer Plus is the
best.
6. Conclusion
In this paper, a modified SAFER plus algorithm is proposed
by replacing PH transform with FWH transform and
introducing a rotation block for every round. The existing
security algorithms are compared with the proposed Safer
Plus algorithm. The entire design is captured in J2ME. The
efficiency of the algorithm is evaluated by the analysis of
parameters like encryption time, encryption frequency, and
data throughput and security level. On comparison, the
modified Safer plus algorithm proved to be better for
implementation in Bluetooth devices than the existing
algorithms.
7. References
[1] Paraskevas kitos, Nicolas sklavos, Kyriakos
Papadomanolakis and Odysseas Koufopavlou university of
patras, Greece,” Hardware Implementation of Bluetooth
Security” IEEE CS and IEEE Communications Society -
January to March 2003. pp. 21 to 29.
[2] Karen Scarfone John Padgette, “Guide to Bluetooth security “
National Institute of standards and technology Special Publication
800-121, U.S. Department of Commerce 43 pages.
[3] Vainio, Juha T. “Bluetooth Security,” Helsinki University of
Technology, 25 May 2000
[4 ] Gyongsu Lee, ”Bluetooth Security Implementation based on
Software Oriented Hardware-Software Partition” IEEE journal
2005. pp. 2070-2074.
[5] Kardach, James, “Bluetooth Architecture Overview,” Intel
Technology Journal, 2000
[6] Jyrki Oraskari, "Bluetooth versus wlan ieee 802.11x",
Helsinki university of technology, october, 2001.
[7] A. Laurie and B.Laurie. serious flaws in blue tooth security
lead to disclosure of personal data. http://bluestumbler.com.
[8] Brent A.Miller And Chatschik Bisdikian “Bluetooth revealed”
– low price edition
[9] Wikipedia.org, “Bluetooth,” Wikipedia.org, 5 March 2005,
http://en.wikipedia.org/wiki/Bluetooth (21 February 2005)
[10] Vrije Universiteit Brussel, “Bluetooth security” phd thesis
December 2004
[11] Keijo M.J. Haataja Licentiate Thesis January 2007
University of Kuopio
[12] J. L. Massey, “On the Optimality of SAFER+ Diffusion”,
Second Advanced Encryption Standard Candidate Conference
(AES2), Rome, Italy, March 22-23 online available at
http://csrc.nist.gov/encryption/aes/round1/conf2/aes2conf.htm.
[13] Wanli Ouyang, W.K. Cham,”Fast Algorithm for Walsh
Hadamard Transform on Sliding Windows” IEEE
TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE
INTELLIGENCE, MANUSCRIPT ID TPAMI-2008-06-0328
[14] NIST: Advanced Encryption Standard (AES) The Federal
Information Processing Standards Publication 197. NIST,
November 26, 2001.
http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
(20.9.2006)
[15] NIST: Recommendation for the Triple Data Encryption
Algorithm (TDEA) Block Cipher. NIST, May 2004.
http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf
(19.9.2006)
[16] NIST: Data Encryption Standard (DES) The Federal
Information Processing Standards Publication 46-3. NIST,
October 1999. http://www.cerberussystems.
com/INFOSEC/stds/fip46-3.htm (19.9.2006)
[17]AlfonsoDeGregorio. Cryptographic Key ReliableLifetimes:
Bounding the Risk of Key Exposure in the Presence of Faults. In
Fault Diagnosis and Tolerance in Cryptography, volume 4236 of
LNCS, pages 144–158. Springer, 2006.
[18] ARC Electronics (n.d.). DSSS and FHSS - Spread Spectrum
modem. Retrieved March 24, 2004 from, Web
site:http://www.arcelect.com/DSSS_FHSS-spead_spectrum.htm
9. International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009
88
D.Sharmila is presently working as
Associate Professor, Department of
ECE, Bannari Amman Institute of
Technology, Sathyamangalam. She
received B.E.(ECE) and M.E.
(Applied Electronics) from Kongu
Engineering College, Perundurai. She
is now pursuing Phd in Wireless
Security. She has 14 years of teaching
experience and has guided several UG and PG projects. She is
a life member of ISTE and Associate member of IE. Her area
of interests are Wireless Security, Low power VLSI, Adhoc
networks. She has published 4 International and National
Journals and presented 20 research papers in International and
National Conferences.
Dr.R. Neelaveni is presently working
as Assistant Professor, Department of
EEE, PSG College of Technology,
Coimbatore. She has a Bachelor’s
degree in ECE, a Master’s degree in
Applied Electronics and PhD in
Biomedical Instrumentation. She has
19 years of teaching experience and
has guided many UG and PG projects. Her research and
teaching interests includes Applied Electronics, Analog
VLSI, Computer Networks, and Biomedical Engineering. She
is a Life member of Indian Society for Technical Education
(ISTE).She has published several research papers in national
Journals and Conferences.