Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Multilayer Data Security Model for Handheld Devices with Simple Encryption Technique and Hardware Software Co-Design


Affiliations
1 Dr. MGR Educational and Reearch Institute [University], Chennai–600095, India
2 SRM University, Chennai–600 026, India
3 Department of Electronics and Communication Engineering at Dr. MGR Educational and Research Institute [University], Chennai–600095, India
     

   Subscribe/Renew Journal


Data transmission increases vastly and hence the crisis in data security arises. The transmitted data are subjected to various proceedings to ensure security. From the usual way of providing security in the presentation layer alone, it is strongly put forth to provide security in the other layers too. This could be done with the help of the Software Hardware co-design. Apart from the Encryption Techniques, small mechanism to screen the trusted users is provided in the Physical layer itself to enrich the strength of the security. Comparison is done with strong encryption and combined weak encryption and hardware technique.

Keywords

Data Encryption, Data Security, Embedded Mote, Hardware Software Co-Design.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 138

PDF Views: 2




  • Multilayer Data Security Model for Handheld Devices with Simple Encryption Technique and Hardware Software Co-Design

Abstract Views: 138  |  PDF Views: 2

Authors

J. D. Ansilla Bensam
Dr. MGR Educational and Reearch Institute [University], Chennai–600095, India
N. Vasudevan
SRM University, Chennai–600 026, India
S. Ravi
Department of Electronics and Communication Engineering at Dr. MGR Educational and Research Institute [University], Chennai–600095, India

Abstract


Data transmission increases vastly and hence the crisis in data security arises. The transmitted data are subjected to various proceedings to ensure security. From the usual way of providing security in the presentation layer alone, it is strongly put forth to provide security in the other layers too. This could be done with the help of the Software Hardware co-design. Apart from the Encryption Techniques, small mechanism to screen the trusted users is provided in the Physical layer itself to enrich the strength of the security. Comparison is done with strong encryption and combined weak encryption and hardware technique.

Keywords


Data Encryption, Data Security, Embedded Mote, Hardware Software Co-Design.