A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Gayathri, K.
- A Study on Various Cryptographic Algorithms and their Scope and Improvement towards Future Security Needs
Authors
1 IFET College of Engineering, Villupuram, IN
2 Assistant Professor of Computer Applications, Department in IFET College of Engineering, IN
Source
Networking and Communication Engineering, Vol 8, No 5 (2016), Pagination: 163-167Abstract
Over the years, numerous cryptographic algorithms have been developed and used in many different protocols and functions. Cryptography is by no means static. Steady advances in computing and in the science of cryptanalysis have made it necessary to adopt newer, stronger algorithms and larger key sizes. Older algorithms are supported in current products to ensure backward compatibility and interoperability. However, some older algorithms and key sizes no longer provide adequate protection from modern threats and should be replaced. This paper summarizes the security of cryptographic algorithms and parameters, gives concrete recommendations regarding which cryptography should be used and which cryptography should be replaced, and describes alternatives and mitigations.
Keywords
Cryptography, Key Sizes, Security, Protocols, Functions, Science of Cryptanalysis- An Enhanced Jamming Attack Detection using Bittrickle Methodology
Authors
1 Department of ECE, Angel College of Engineering and Technology, Tirupur, IN
Source
Networking and Communication Engineering, Vol 11, No 3 (2019), Pagination: 36-40Abstract
When target devices are transmitting a reactive jammer jams the wireless channel; Reactive jamming is harder to track and compensate against the constant jamming methods. Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum DSSS) have been widely used against Jamming attacks. If high power transmitter or frequency channel is jammed then both these method will fail. We use broad band and high power reactive jammer to avoid jamming attacks. In this proposed method we use bit trickle method to avoid jamming. Bit Trickle is a method which is used to find attackers when using broadband communication between transmitter and receiver. Users having secret key to access the data from anti jammer. Once the security key is correct then only the transmission occurs.
Keywords
Wireless Network, Jamming, Anti-Jamming, Bit Trickle Method.References
- Reactive jamming technologies. http://www.ece.gatech.edu/academic/courses/ece4007/08fall/ece4007l02/lm5/jammer.doc.
- Y. Liu and P. Ning. Bittrickle: Defending against broadband and highpower reactive jamming attacks. Technical Report TR-2011-17, NC State University, Computer Science Department, July 2011.
- Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential dsss: Jamming-resistant wireless broadcast communication. In Proceedings of the 2010 IEEE INFOCOM, 2010.
- Robert A. Scholtz. Spread Spectrum Communications Handbook. McGraw-Hill, 2001.
- W. Xu, W. Trappe, and Y. Zhang. Anti-jamming timing channels for wireless networks. In WiSec ’08: Proceedings of the first ACM conference on Wireless network security, pages 203–213, New York,NY, USA, 2008. ACM.
- M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders, “Short paper: Reactive jamming in wireless networks: How realistic is the threat?” in Proc. 4th ACM Conf. Wireless Netw. Secur., 2011, pp. 47–52.
- W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: Attack and defense strategies,” IEEE Netw., vol. 20, no. 3, pp. 41–47, May/Jun. 2006
- K. Grover, A. Lim, and Q. Yang, “Jamming and anti–jamming techniques in wireless networks: A survey,” Int. J. Ad Hoc Ubiquitous Comput., vol. 17, no. 4, pp. 197–215, 2014.
- D. Giustiniano, V. Lenders, J. B. Schmitt, M. Spuhler, and M. Wilhelm, “Detection of reactive jamming DSSS-based wireless networks,” in Proc. 6th ACM Conf. Secur. Privacy Wireless Mobile Netw., 2013, pp. 43–48.
- E.-K. Lee, S. Y. Oh, and M. Gerla, “Randomized channel hopping scheme for anti-jamming communication,” in Proc. IFIP Wireless Days (WD), Oct. 2010, pp. 1–5.
- Y. Liu and P. Ning, “BitTrickle: Defending against broadband and highpower reactive jamming attacks,” in Proc. IEEE INFOCOM, Mar. 2012, pp. 909
- W. Xu, W. Trappe, and Y. Zhang, “Anti-jamming timing channels for wireless networks,” in Proc. 1st ACM Conf. Wireless Netw. Secur., New York, NY, USA, 2008, pp. 203–213.