SlideShare a Scribd company logo
International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
DOI:10.5121/ijcis.2016.6401 1
NEW ALGORITHM FOR WIRELESS NETWORK
COMMUNICATION SECURITY
Sirwan Ahmed1
and Majeed Nader2
1
Department of CNS/ATM, Sulaimaniyah International Airport,
Sulaimani, Iraq
2
Department of Electrical and Computer Engineering, Wayne State University,
Detroit, USA
ABSTRACT
This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A
new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in
designing of wireless network communication system based on network simulator (NS2), which is crucial to
protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid
algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in
the rules of modelling and Mamdani Style is used for the evaluations
KEYWORDS
NS2, TCL, C++, Stream Cipher, Block cipher, Fuzzy logic.
1. INTRODUCTION
Information security is the protection of information and its critical elements, including the
system and the hardware that process, store, and transmit that information. Cryptography plays an
important role in today’s digital world. Many cryptographic techniques have been developed to
meet the various requirements arising from applications [1][2].
Cryptographic algorithm, which is also called a cipher, is the mathematical function used for
encryption and decryption. Generally, there are two related functions: one for encryption and the
other for decryption [3]. Encryption/decryption protects information from being used by the
attacker. Encryption/decryption is a security mechanism where cipher algorithms are applied
together with a secret key to encrypt data so that they are unreadable if they are intercepted
[4][5][6]. Encryption algorithm characteristics that were considered for the development of
metrics are type, complexity, and attack [7].
Network simulator (NS2) is employed to design wireless communication networks and evaluate
security. Two programming languages are used to convert plain text to cipher text, which are
terminal command language (TCL) and C++. Compare to the other network simulation tools, The
NS2 is an important mean for network research because of its advantages of flexibility, high
efficiency, low cost, and unlimited number of nodes for network design. It is designed for Unix
systems but runs under Windows CygWin as well; It is freely available for research and
education purposes [4][8].
Fuzzy inference systems (FISs) are also known as fuzzy rule based systems, fuzzy model, fuzzy
expert system, and fuzzy associative memory. This is a major unit of a fuzzy logic system. The
decision-making is an important part of the entire system. The FIS formulates suitable rules and
International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
2
based upon the rules the decision is made. This is mainly based on the concepts of the fuzzy set
theory, fuzzy IF-THEN rules, and fuzzy reasoning [3].
In this research, we use the fuzzy logic m- file in Mat lab for the security evaluation of wireless
networks. After we study the existing algorithms, we propose a new algorithm, hybrid system, for
wireless network communication security. The traditional algorithm, novel algorithm, clock
cipher algorithm, and the proposed algorithm are evaluated to highlight the security level of the
new algorithm. We employ Mamdani style for the evaluations and logic (AND) for modelling.
2. PREVIOUS WORKS AND THE PROPOSED ALGORITHM
The security of wireless communication network has been widely studied by researchers. [9]
performs a comparative study between DES, 3DES and AES. The comparison is presented into
nine factors, which are key length, cipher type, block size, developed, cryptanalysis resistance,
security, possibility key, Possible ACSII printable character keys, time required to check all
possible keys at 50 billion second. These eligible proved that the AES is better than DES and
3DES. A novel network security evaluation method framework, with a comprehensive analysis of
the Multiple Attribute Decision Making (MADM) theory is discussed in [10]. This framework
constructed a measurement model of network security, and normalizes the measurement process.
It also provided specific evaluation methods for satisfying the practical requirements. There in
after, an example of network worm propagation evaluation is illustrated. In comparison to the
existing evaluation methods, their methods are more comprehensive and scientific, which can
make the rank preference order of each worm life cycle stage of each worm defence strategy. The
approach in [10] makes a contribution to the standardization and Scientific of the network
security evaluation process.
A cryptographic algorithms (RC5) is also evaluated in [11]. Blowfish and DES block cipher
algorithms were compared by using C# program. Comparative analysis of RC5, Blowfish and
DES is performed with a set of input files and evaluated the encryption and decryption time. The
results conclude that RC5 is 1.54 times faster than Blowfish and 2.57 times faster than DES. The
results also conclude that the performance of Blowfish algorithm is inversely proportional to key
size, if key size increases, the performance decreases and vice-versa. In resource utilization point
of view, RC5 utilize extra memory compared to Blowfish and DES, while CPU utilization is
approximately the same for all these three algorithms. So RC5 block cipher algorithm is faster
and simpler than Blowfish and DES block cipher algorithms. Using RC5 is beneficial where the
high encryption rate is required [11].
NS2 is employed in [12] to simulate the end user performance of the wireless network consisting
of two access points and five nodes for variable data and transmission rate of the nodes. The
simulation results about network behaviour. First variable throughput and transmission rate for
the nodes of access point 1 and access point 2, the performance of the network remains constant
and there is high fluctuation for a single node. Second comparative study between packet drop
rate and transmission rate for the nodes of Access point 1 and Access point 2 in [12] shows that
the performances of the observed networks differ and there is high fluctuation for a single node in
a 3 node network. A third important feature of performance study is an average packets end to
end delay and transmission rate for the nodes of access point 1 and access point 2. The
performance of the whole network is finding to be transient initially, but it comes to a stable state
after a certain amount of time [12].
A performance evaluation of different symmetric algorithms is studied in [13]. The selected
algorithms are AES, DES, 3DES, RC6, Blowfish and RC2.Several points can be concluded from
the simulation results and it is found that Blowfish provides the best performance among all
algorithms. Then after that the best algorithm which consumes less power, and less time is RC6.
International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
3
Also the worst approach among all the algorithms in terms of CPU load is RC2 because it leads to
heavy workload of CPU as it is very time consuming factor [13].
Two of the common cipher techniques are stream cipher and block cipher. Both are well studied
and implemented in the current cipher systems [14] [15]. Stream cipher, which is a symmetric key
cipher technique, is a technique of combining some plaintext data digits with a digit stream of
pseudo-random cipher that is known as keystream. The cipher text stream digits in stream cipher
are generated by encrypting each digit of the plaintext with the specified digit of the keystream
separately. The encryptions of the digits are dependent on the cipher state at the time. Therefore,
it is called state cipher. In stream cipher exclusive-or (XOR) is employed as bit operation to
implement the cipher technique [14].
Unlike stream cipher, block cipher is a scheme of encryption and decryption where instead of a
digit we treat with a clock of digits of the plaintext digits. The scheme generates an equal size
ciphertext block with the chosen block of the plaintext. In most cases, the block cipher has a
structure of Feistel which has multi identical processing rounds. Half of the processed data is
substituted in each round and the two halves are interchanged and put after the substituted half.
The main goal is to expand the original key as technique to use different key for each round [15].
Both stream and clock cipher has pro and cons. However, we could improve the performance by
taking the advantage of both of them and combine them in one technique. We name the new
technique as Hybrid Algorithm which is a new combination of the previous two algorithms. We
combine both algorithm and control them. One of the new idea we use is controlling the new
algorithm by the user. There is a communication between the transmitter and receiver of the
information bits. We evaluated the new algorithm by comparing the performances and study the
security of the wireless communication network. We change the algorithm according to the
network supervisor as it is shown in Figure 1.
Figure 1. The Diagram of the Hybrid Algorithm.
3. SYSTEM MODELLING
A wireless communication network is designed and developed by utilizing NS2 package.
Network security algorithms, such as stream cipher and Block cipher, are employed for
exchanging the information between the nodes. We change the algorithm according to the
network supervisor as it is illustrated in Figure 1. The security of the wireless network by using
fuzzy logic for Hybrid algorithm (stream cipher with Block cipher) and conventional block cipher
algorithms is evaluated. We compare both algorithms for network security. Evaluating the Block
International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
4
cipher, it can be noted that this algorithm has weaknesses and it can be broken by the hackers
easily.
The fuzzy logic tool has been widely used for modelling of the evaluation of the network security
algorithms. Figure 2 shows a case where only traditional algorithm is used for network security
evaluation by using three measures.
Figure 2. The Variable Input and Output of the Traditional Algorithm
It is proven that the networks security depends on the algorithm that is used in the networks. The
results of the evaluations show that it is necessary we to develop the algorithms to be more
sophisticated so that we can improve the security of the networks and Figure 3 shows this fact.
The new algorithm is evaluated by using Fuzzy logic.
Figure 3. The Variable Input and Output Functions of the Hybrid Algorithm
3.1 DESIGN AND SIMULATION
The results reveal that the network security is limited based on the utilized algorithm in the
network evaluation. The first set of experiments (Table 1), it can be noted that if the conventional
algorithm is used for network security, only in few cases the system has good security. For
instance, only a case with the following parameters: key Size =512 bits, block size=64 bits, and
International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
5
number of rounds =64 has a good security as it’s shown in Table 1. Table 1 contains the results
for the cases where three measures are used for the network security evaluation. It can be noted
that the more sophisticated algorithm is used, the better security of the network is achieved. This
fact can be seen in the second set of experiments where five measures are used for the network
security evaluation. Table 2 shows the improvements of the second experiments which uses the
proposed method of the evaluation. It can be noted that increasing the measures improves the
security of the network.
Table 1. The Modelling Results of the Traditional Algorithm using Mamdani Style.
4. ANALYSIS OF THE HYBRID ALGORITHM
A wireless network is designed based on a hybrid algorithm of network security by using NS2
based on TCL and C++ programs. We also evaluated the networks for the conventional and the
hybrid algorithm. Evaluating the network securities by using fuzzy logic, we can conclude the
followings:
• Cryptography algorithms (block cipher) is used to secure information in designing of
wireless network for data package transfer between nodes.
• Improving the security of a wireless network is still a complicated process and it requires
periodical evaluations. Building security of wireless network systems requires a
comprehensive security model referring to results of the modelling of evaluation.
• Different metrics of conventional algorithms, key length of stream cipher and sequence
code are used as measures to improve the security level of the network. It is noticed in the
results in Table 1 and Table 2 that the structure of the crypto algorithms effect on security
level. The structure and controlling of the algorithm effect on security level.
International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
6
Table 2. The Modelling Results of Hybrid Algorithm Using Mamdani Style.
• The fuzzy logic is used to evaluate the complexity of the wireless network, then the given
parameters of the conventional algorithm, the key length of stream cipher algorithm, and
sequence code for modelling are used to choose more secure algorithms and select a
secure structure. Fuzzy logics have facility tools to evaluate the security of the network.
• Some novelties of this work compared to the others designs, are: a. in this work the
security evaluation of network based on five metrics of cryptographic algorithms are
used, while other projects have used only three metrics. b. compare to existing modelling
and techniques that are used, the model which is used in this work has more facility.
5. CONCLUSIONS
The hybrid algorithm is proposed and used to secure information in the wireless network design
for data package transfer between the nodes. 65 mobile node wireless networks for the network
simulation are constructed and NS2 is employed to study and analyse the performance of the
network. The evaluation modelling results reveal that a comprehensive security model is required
to develop the security of wireless network systems. As the security of wireless network is still a
complicated process, it needs a periodical evaluation. Utilizing the fuzzy logic for the evaluation
of the complexity of the wireless network, we proved that the hybrid system is more complex
than conventional system for security in the wireless network and it has a better performance.
International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
7
REFERENCES
[1] J. Markus, Y. Moti, & Z. Jianying, (2004) Applied Cryptography and Network Security, Berlin
Heidelberg: Springer-Verlag.
[2] S. William, (2011) Network Security Essential: Application and Standards, United States of America:
Fourth Edition.
[3] S. Mohammed & S. Sadkhan, (2013) “Block cipher security evaluation based on fuzzy logic,” in The
First International Conference of Electrical, Communication, Computer, Power and Control
Engineering (ICECCPCE), Iraq, Mosul.
[4] I. Teerawat & H. Ekram, (2008) Introduction to Network Simulator NS2, United States of America:
Second Edition.
[5] M. Matin, (2009) “Performance evaluation symmetric encryption algorithm in MANNET and
WLAN,” in International Conference for Technical Postgraduates (TECHPOS), Kuala Lumpur, pp. 1-
4.
[6] J. Fu, L. Huang, & Y. Yao, (2010) “Application of BP neural network in wireless network security
evaluation,” in IEEE International Conference on Wireless Communications, Networking and
Information Security (WCNIS), Beijing, China, pp. 592-596.
[7] G. Germano, et al. (2005) “Evaluation of Security Mechanisms in Wireless Sensor Networks,” in
Proceedings of the Systems Communications (ICW05), p.1-6.
[8] G. E. Almargni & G. Abdalla, (2012) “Design and simulation of wireless network using NS2,” in
second International Conference on Computer Science and Information Technology (ICCSIT),
Singapore, pp. 157-161.
[9] Alanazi Hamdan.O., Zaidan B.B., Zaidan A.A., Jalab Hamid A., Shabbir M. and Al-Nabhani Y.,
(2010) " New Comparative Study Between DES, 3DES and AES within Nine Factors" , Journal of
Computing , Volume 2, issue 3, pp. 152-157.
[10] Ezreik Almargni, Gheryani Abdalla, (2012) "Design and Simulation of Wireless Network using
NS2", second International Conference on Computer Science and Information Technology
(ICCSIT'2012) Singapore, pp.157-161.
[11] Jinjing ZHAO, Yan WEN, and Dongxia WANG, (2011) "A Network Security Evaluation Method
Framework Based on Multiple Criteria Dicision Making Theory", Fifth International Conference on
Innovative Mobile and Internet Services in Ubiquitous Computing, IEEE computer society, PP. 371-
375.
[12] Singh Rajender, Misra Rahul , and Kumar Vikas , (2013) "Analysis the Impact of Symmetric
cryptographic Algorithms on Power Consumption for various data types", International Journal on
Recent and Innovation Trends in Computing and Communication, Volume: 1 Issue: 4, pp 221-226.
[13] Verma Harsh Kumar, Singh Ravindra Kumar, (2012) "Performance Analysis of RC5, Blowfish and
DES Block Cipher Algorithms", International Journal of Computer Applications, Volume 42, No.16,
PP. 8-14.
[14] A. Menezes, P. van Oorschot, & S. Vanstone, (1996) Handbook of Applied Cryptography, CRC
Press, 1996.
[15] S. William, (2011) Cryptography and Network Security, United States of America: Fifth Edition.
International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
8
AUTHORS
Sirwan Mohammed has received the B.S. in Electrical Engineering from University of
Salahaddin, in 2005, and the M.S. in Computer and Automation from University of Slemani,
Kurdistan of Iraq, in 2014. He is currently a CNS/ATM manager at Sulaimaniyah
International Airport. Mr. Mohammed is an IEEE student member and he is also a member
of Union Engineering of Kurdistan. He has been working as telecommunication engineer for
more than ten years for Sulaimaniyah International Airport. His research interest is security,
telecommunication and networks. He is the co-author of multiple publication in IEEE conferences and
other relevant conferences.
Majeed Nader has received the B.Sc. in electrical engineering from University of
Salahaddin in 2005, the M.Sc. in Electronic and Communication Engineering from
University of Slemani in 2009, in Iraq. He also has earned M.S in Computer Engineering
from Wayne State University, Michigan, USA. He is currently a Ph.D. Candidate in ECE
department and a pert time faculty in Engineering technology in Wayne State University.
Mr. Nader is an IEEE member. He has worked as Telecommunication Engineer for 7 years and he is
currently a senior Electrical Engineer. He is an honoured member of Tau Beta Pi in USA. Mr. Nader’s
research interest is processor design, FPGA, and Embedded Network system for automotive applications.

More Related Content

What's hot (18)

Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
WilliamY3
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
IJCNCJournal
 
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
ijircee
 
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
CSCJournals
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
 
A Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSA Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETS
CSCJournals
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
IJCNCJournal
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
Nikhil Jain
 
Ijcnc050212
Ijcnc050212Ijcnc050212
Ijcnc050212
IJCNCJournal
 
Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice based
ijcsa
 
1670 1673
1670 16731670 1673
1670 1673
Editor IJARCET
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation of
caijjournal
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of common
IJNSA Journal
 
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
IJNSA Journal
 
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Nikhil Jain
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
WilliamY3
 
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
ijircee
 
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
CSCJournals
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
 
A Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSA Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETS
CSCJournals
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
IJCNCJournal
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
Nikhil Jain
 
Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice based
ijcsa
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation of
caijjournal
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of common
IJNSA Journal
 
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
IJNSA Journal
 
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Nikhil Jain
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 

Viewers also liked (15)

Evaluation question 3
Evaluation question 3Evaluation question 3
Evaluation question 3
RichieIdemudia
 
Evaluation question 3
Evaluation question 3Evaluation question 3
Evaluation question 3
RichieIdemudia
 
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYA NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
ijcisjournal
 
Climate change
Climate changeClimate change
Climate change
DDushica
 
Silabi ganjil meguwo
Silabi ganjil meguwoSilabi ganjil meguwo
Silabi ganjil meguwo
demansa
 
Evaluation question 3
Evaluation question 3Evaluation question 3
Evaluation question 3
RichieIdemudia
 
Evaluation question 3
Evaluation question 3Evaluation question 3
Evaluation question 3
RichieIdemudia
 
Call-To-Action Guide
Call-To-Action GuideCall-To-Action Guide
Call-To-Action Guide
vengreat
 
The Dewey Diet
The Dewey DietThe Dewey Diet
The Dewey Diet
Caitlin Bennett
 
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...
ijcisjournal
 
Evaluation question 3
Evaluation question 3Evaluation question 3
Evaluation question 3
RichieIdemudia
 
Dream Catcher Lesson Plan
Dream Catcher Lesson PlanDream Catcher Lesson Plan
Dream Catcher Lesson Plan
Joardyn Douillette
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
ijcisjournal
 
Force and Motion Review
Force and Motion ReviewForce and Motion Review
Force and Motion Review
crautry
 
Force and Motion Review ppt
Force and Motion Review pptForce and Motion Review ppt
Force and Motion Review ppt
crautry
 
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYA NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
ijcisjournal
 
Climate change
Climate changeClimate change
Climate change
DDushica
 
Silabi ganjil meguwo
Silabi ganjil meguwoSilabi ganjil meguwo
Silabi ganjil meguwo
demansa
 
Call-To-Action Guide
Call-To-Action GuideCall-To-Action Guide
Call-To-Action Guide
vengreat
 
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...
ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPE...
ijcisjournal
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
ijcisjournal
 
Force and Motion Review
Force and Motion ReviewForce and Motion Review
Force and Motion Review
crautry
 
Force and Motion Review ppt
Force and Motion Review pptForce and Motion Review ppt
Force and Motion Review ppt
crautry
 

Similar to NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY (20)

A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
IJERA Editor
 
B03302007012
B03302007012B03302007012
B03302007012
theijes
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal
 
Application of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of networkApplication of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of network
IRJET Journal
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
IOSR Journals
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
 
A Novel DNA Encryption System Using Cellular Automata
A Novel DNA Encryption System Using Cellular AutomataA Novel DNA Encryption System Using Cellular Automata
A Novel DNA Encryption System Using Cellular Automata
ClaraZara1
 
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAA NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
ijsptm
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
JIEMS Akkalkuwa
 
Randomness evaluation framework of cryptographic algorithms
Randomness evaluation framework of cryptographic algorithmsRandomness evaluation framework of cryptographic algorithms
Randomness evaluation framework of cryptographic algorithms
ijcisjournal
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
IJNSA Journal
 
A Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETA Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANET
IJNSA Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
ijcisjournal
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
IJECEIAES
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
IJERA Editor
 
B03302007012
B03302007012B03302007012
B03302007012
theijes
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal
 
Application of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of networkApplication of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of network
IRJET Journal
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
IOSR Journals
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
 
A Novel DNA Encryption System Using Cellular Automata
A Novel DNA Encryption System Using Cellular AutomataA Novel DNA Encryption System Using Cellular Automata
A Novel DNA Encryption System Using Cellular Automata
ClaraZara1
 
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAA NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
ijsptm
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
JIEMS Akkalkuwa
 
Randomness evaluation framework of cryptographic algorithms
Randomness evaluation framework of cryptographic algorithmsRandomness evaluation framework of cryptographic algorithms
Randomness evaluation framework of cryptographic algorithms
ijcisjournal
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
IJNSA Journal
 
A Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETA Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANET
IJNSA Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
ijcisjournal
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
IJECEIAES
 

Recently uploaded (20)

*"The Segmented Blueprint: Unlocking Insect Body Architecture"*.pptx
*"The Segmented Blueprint: Unlocking Insect Body Architecture"*.pptx*"The Segmented Blueprint: Unlocking Insect Body Architecture"*.pptx
*"The Segmented Blueprint: Unlocking Insect Body Architecture"*.pptx
Arshad Shaikh
 
Cultivation Practice of Turmeric in Nepal.pptx
Cultivation Practice of Turmeric in Nepal.pptxCultivation Practice of Turmeric in Nepal.pptx
Cultivation Practice of Turmeric in Nepal.pptx
UmeshTimilsina1
 
The role of wall art in interior designing
The role of wall art in interior designingThe role of wall art in interior designing
The role of wall art in interior designing
meghaark2110
 
LDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDMMIA Reiki News Ed3 Vol1 For Team and GuestsLDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDM Mia eStudios
 
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
Cultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptxCultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptx
UmeshTimilsina1
 
How to Clean Your Contacts Using the Deduplication Menu in Odoo 18
How to Clean Your Contacts Using the Deduplication Menu in Odoo 18How to Clean Your Contacts Using the Deduplication Menu in Odoo 18
How to Clean Your Contacts Using the Deduplication Menu in Odoo 18
Celine George
 
How to Manage Upselling in Odoo 18 Sales
How to Manage Upselling in Odoo 18 SalesHow to Manage Upselling in Odoo 18 Sales
How to Manage Upselling in Odoo 18 Sales
Celine George
 
APGAR SCORE BY sweety Tamanna Mahapatra MSc Pediatric
APGAR SCORE  BY sweety Tamanna Mahapatra MSc PediatricAPGAR SCORE  BY sweety Tamanna Mahapatra MSc Pediatric
APGAR SCORE BY sweety Tamanna Mahapatra MSc Pediatric
SweetytamannaMohapat
 
*"Sensing the World: Insect Sensory Systems"*
*"Sensing the World: Insect Sensory Systems"**"Sensing the World: Insect Sensory Systems"*
*"Sensing the World: Insect Sensory Systems"*
Arshad Shaikh
 
What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)
jemille6
 
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptxTERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
PoojaSen20
 
How to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 PurchaseHow to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 Purchase
Celine George
 
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptxANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
Mayuri Chavan
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
Nguyen Thanh Tu Collection
 
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
Dr. Nasir Mustafa
 
Final Evaluation.docx...........................
Final Evaluation.docx...........................Final Evaluation.docx...........................
Final Evaluation.docx...........................
l1bbyburrell
 
2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx
mansk2
 
How to Configure Public Holidays & Mandatory Days in Odoo 18
How to Configure Public Holidays & Mandatory Days in Odoo 18How to Configure Public Holidays & Mandatory Days in Odoo 18
How to Configure Public Holidays & Mandatory Days in Odoo 18
Celine George
 
E-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26ASE-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26AS
Abinash Palangdar
 
*"The Segmented Blueprint: Unlocking Insect Body Architecture"*.pptx
*"The Segmented Blueprint: Unlocking Insect Body Architecture"*.pptx*"The Segmented Blueprint: Unlocking Insect Body Architecture"*.pptx
*"The Segmented Blueprint: Unlocking Insect Body Architecture"*.pptx
Arshad Shaikh
 
Cultivation Practice of Turmeric in Nepal.pptx
Cultivation Practice of Turmeric in Nepal.pptxCultivation Practice of Turmeric in Nepal.pptx
Cultivation Practice of Turmeric in Nepal.pptx
UmeshTimilsina1
 
The role of wall art in interior designing
The role of wall art in interior designingThe role of wall art in interior designing
The role of wall art in interior designing
meghaark2110
 
LDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDMMIA Reiki News Ed3 Vol1 For Team and GuestsLDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDMMIA Reiki News Ed3 Vol1 For Team and Guests
LDM Mia eStudios
 
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
Cultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptxCultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptx
UmeshTimilsina1
 
How to Clean Your Contacts Using the Deduplication Menu in Odoo 18
How to Clean Your Contacts Using the Deduplication Menu in Odoo 18How to Clean Your Contacts Using the Deduplication Menu in Odoo 18
How to Clean Your Contacts Using the Deduplication Menu in Odoo 18
Celine George
 
How to Manage Upselling in Odoo 18 Sales
How to Manage Upselling in Odoo 18 SalesHow to Manage Upselling in Odoo 18 Sales
How to Manage Upselling in Odoo 18 Sales
Celine George
 
APGAR SCORE BY sweety Tamanna Mahapatra MSc Pediatric
APGAR SCORE  BY sweety Tamanna Mahapatra MSc PediatricAPGAR SCORE  BY sweety Tamanna Mahapatra MSc Pediatric
APGAR SCORE BY sweety Tamanna Mahapatra MSc Pediatric
SweetytamannaMohapat
 
*"Sensing the World: Insect Sensory Systems"*
*"Sensing the World: Insect Sensory Systems"**"Sensing the World: Insect Sensory Systems"*
*"Sensing the World: Insect Sensory Systems"*
Arshad Shaikh
 
What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)
jemille6
 
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptxTERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
PoojaSen20
 
How to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 PurchaseHow to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 Purchase
Celine George
 
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptxANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
ANTI-VIRAL DRUGS unit 3 Pharmacology 3.pptx
Mayuri Chavan
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
BÀI TẬP BỔ TRỢ TIẾNG ANH 9 THEO ĐƠN VỊ BÀI HỌC - GLOBAL SUCCESS - CẢ NĂM (TỪ...
Nguyen Thanh Tu Collection
 
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
Dr. Nasir Mustafa
 
Final Evaluation.docx...........................
Final Evaluation.docx...........................Final Evaluation.docx...........................
Final Evaluation.docx...........................
l1bbyburrell
 
2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx
mansk2
 
How to Configure Public Holidays & Mandatory Days in Odoo 18
How to Configure Public Holidays & Mandatory Days in Odoo 18How to Configure Public Holidays & Mandatory Days in Odoo 18
How to Configure Public Holidays & Mandatory Days in Odoo 18
Celine George
 
E-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26ASE-Filing_of_Income_Tax.pptx and concept of form 26AS
E-Filing_of_Income_Tax.pptx and concept of form 26AS
Abinash Palangdar
 

NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY

  • 1. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016 DOI:10.5121/ijcis.2016.6401 1 NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY Sirwan Ahmed1 and Majeed Nader2 1 Department of CNS/ATM, Sulaimaniyah International Airport, Sulaimani, Iraq 2 Department of Electrical and Computer Engineering, Wayne State University, Detroit, USA ABSTRACT This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations KEYWORDS NS2, TCL, C++, Stream Cipher, Block cipher, Fuzzy logic. 1. INTRODUCTION Information security is the protection of information and its critical elements, including the system and the hardware that process, store, and transmit that information. Cryptography plays an important role in today’s digital world. Many cryptographic techniques have been developed to meet the various requirements arising from applications [1][2]. Cryptographic algorithm, which is also called a cipher, is the mathematical function used for encryption and decryption. Generally, there are two related functions: one for encryption and the other for decryption [3]. Encryption/decryption protects information from being used by the attacker. Encryption/decryption is a security mechanism where cipher algorithms are applied together with a secret key to encrypt data so that they are unreadable if they are intercepted [4][5][6]. Encryption algorithm characteristics that were considered for the development of metrics are type, complexity, and attack [7]. Network simulator (NS2) is employed to design wireless communication networks and evaluate security. Two programming languages are used to convert plain text to cipher text, which are terminal command language (TCL) and C++. Compare to the other network simulation tools, The NS2 is an important mean for network research because of its advantages of flexibility, high efficiency, low cost, and unlimited number of nodes for network design. It is designed for Unix systems but runs under Windows CygWin as well; It is freely available for research and education purposes [4][8]. Fuzzy inference systems (FISs) are also known as fuzzy rule based systems, fuzzy model, fuzzy expert system, and fuzzy associative memory. This is a major unit of a fuzzy logic system. The decision-making is an important part of the entire system. The FIS formulates suitable rules and
  • 2. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016 2 based upon the rules the decision is made. This is mainly based on the concepts of the fuzzy set theory, fuzzy IF-THEN rules, and fuzzy reasoning [3]. In this research, we use the fuzzy logic m- file in Mat lab for the security evaluation of wireless networks. After we study the existing algorithms, we propose a new algorithm, hybrid system, for wireless network communication security. The traditional algorithm, novel algorithm, clock cipher algorithm, and the proposed algorithm are evaluated to highlight the security level of the new algorithm. We employ Mamdani style for the evaluations and logic (AND) for modelling. 2. PREVIOUS WORKS AND THE PROPOSED ALGORITHM The security of wireless communication network has been widely studied by researchers. [9] performs a comparative study between DES, 3DES and AES. The comparison is presented into nine factors, which are key length, cipher type, block size, developed, cryptanalysis resistance, security, possibility key, Possible ACSII printable character keys, time required to check all possible keys at 50 billion second. These eligible proved that the AES is better than DES and 3DES. A novel network security evaluation method framework, with a comprehensive analysis of the Multiple Attribute Decision Making (MADM) theory is discussed in [10]. This framework constructed a measurement model of network security, and normalizes the measurement process. It also provided specific evaluation methods for satisfying the practical requirements. There in after, an example of network worm propagation evaluation is illustrated. In comparison to the existing evaluation methods, their methods are more comprehensive and scientific, which can make the rank preference order of each worm life cycle stage of each worm defence strategy. The approach in [10] makes a contribution to the standardization and Scientific of the network security evaluation process. A cryptographic algorithms (RC5) is also evaluated in [11]. Blowfish and DES block cipher algorithms were compared by using C# program. Comparative analysis of RC5, Blowfish and DES is performed with a set of input files and evaluated the encryption and decryption time. The results conclude that RC5 is 1.54 times faster than Blowfish and 2.57 times faster than DES. The results also conclude that the performance of Blowfish algorithm is inversely proportional to key size, if key size increases, the performance decreases and vice-versa. In resource utilization point of view, RC5 utilize extra memory compared to Blowfish and DES, while CPU utilization is approximately the same for all these three algorithms. So RC5 block cipher algorithm is faster and simpler than Blowfish and DES block cipher algorithms. Using RC5 is beneficial where the high encryption rate is required [11]. NS2 is employed in [12] to simulate the end user performance of the wireless network consisting of two access points and five nodes for variable data and transmission rate of the nodes. The simulation results about network behaviour. First variable throughput and transmission rate for the nodes of access point 1 and access point 2, the performance of the network remains constant and there is high fluctuation for a single node. Second comparative study between packet drop rate and transmission rate for the nodes of Access point 1 and Access point 2 in [12] shows that the performances of the observed networks differ and there is high fluctuation for a single node in a 3 node network. A third important feature of performance study is an average packets end to end delay and transmission rate for the nodes of access point 1 and access point 2. The performance of the whole network is finding to be transient initially, but it comes to a stable state after a certain amount of time [12]. A performance evaluation of different symmetric algorithms is studied in [13]. The selected algorithms are AES, DES, 3DES, RC6, Blowfish and RC2.Several points can be concluded from the simulation results and it is found that Blowfish provides the best performance among all algorithms. Then after that the best algorithm which consumes less power, and less time is RC6.
  • 3. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016 3 Also the worst approach among all the algorithms in terms of CPU load is RC2 because it leads to heavy workload of CPU as it is very time consuming factor [13]. Two of the common cipher techniques are stream cipher and block cipher. Both are well studied and implemented in the current cipher systems [14] [15]. Stream cipher, which is a symmetric key cipher technique, is a technique of combining some plaintext data digits with a digit stream of pseudo-random cipher that is known as keystream. The cipher text stream digits in stream cipher are generated by encrypting each digit of the plaintext with the specified digit of the keystream separately. The encryptions of the digits are dependent on the cipher state at the time. Therefore, it is called state cipher. In stream cipher exclusive-or (XOR) is employed as bit operation to implement the cipher technique [14]. Unlike stream cipher, block cipher is a scheme of encryption and decryption where instead of a digit we treat with a clock of digits of the plaintext digits. The scheme generates an equal size ciphertext block with the chosen block of the plaintext. In most cases, the block cipher has a structure of Feistel which has multi identical processing rounds. Half of the processed data is substituted in each round and the two halves are interchanged and put after the substituted half. The main goal is to expand the original key as technique to use different key for each round [15]. Both stream and clock cipher has pro and cons. However, we could improve the performance by taking the advantage of both of them and combine them in one technique. We name the new technique as Hybrid Algorithm which is a new combination of the previous two algorithms. We combine both algorithm and control them. One of the new idea we use is controlling the new algorithm by the user. There is a communication between the transmitter and receiver of the information bits. We evaluated the new algorithm by comparing the performances and study the security of the wireless communication network. We change the algorithm according to the network supervisor as it is shown in Figure 1. Figure 1. The Diagram of the Hybrid Algorithm. 3. SYSTEM MODELLING A wireless communication network is designed and developed by utilizing NS2 package. Network security algorithms, such as stream cipher and Block cipher, are employed for exchanging the information between the nodes. We change the algorithm according to the network supervisor as it is illustrated in Figure 1. The security of the wireless network by using fuzzy logic for Hybrid algorithm (stream cipher with Block cipher) and conventional block cipher algorithms is evaluated. We compare both algorithms for network security. Evaluating the Block
  • 4. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016 4 cipher, it can be noted that this algorithm has weaknesses and it can be broken by the hackers easily. The fuzzy logic tool has been widely used for modelling of the evaluation of the network security algorithms. Figure 2 shows a case where only traditional algorithm is used for network security evaluation by using three measures. Figure 2. The Variable Input and Output of the Traditional Algorithm It is proven that the networks security depends on the algorithm that is used in the networks. The results of the evaluations show that it is necessary we to develop the algorithms to be more sophisticated so that we can improve the security of the networks and Figure 3 shows this fact. The new algorithm is evaluated by using Fuzzy logic. Figure 3. The Variable Input and Output Functions of the Hybrid Algorithm 3.1 DESIGN AND SIMULATION The results reveal that the network security is limited based on the utilized algorithm in the network evaluation. The first set of experiments (Table 1), it can be noted that if the conventional algorithm is used for network security, only in few cases the system has good security. For instance, only a case with the following parameters: key Size =512 bits, block size=64 bits, and
  • 5. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016 5 number of rounds =64 has a good security as it’s shown in Table 1. Table 1 contains the results for the cases where three measures are used for the network security evaluation. It can be noted that the more sophisticated algorithm is used, the better security of the network is achieved. This fact can be seen in the second set of experiments where five measures are used for the network security evaluation. Table 2 shows the improvements of the second experiments which uses the proposed method of the evaluation. It can be noted that increasing the measures improves the security of the network. Table 1. The Modelling Results of the Traditional Algorithm using Mamdani Style. 4. ANALYSIS OF THE HYBRID ALGORITHM A wireless network is designed based on a hybrid algorithm of network security by using NS2 based on TCL and C++ programs. We also evaluated the networks for the conventional and the hybrid algorithm. Evaluating the network securities by using fuzzy logic, we can conclude the followings: • Cryptography algorithms (block cipher) is used to secure information in designing of wireless network for data package transfer between nodes. • Improving the security of a wireless network is still a complicated process and it requires periodical evaluations. Building security of wireless network systems requires a comprehensive security model referring to results of the modelling of evaluation. • Different metrics of conventional algorithms, key length of stream cipher and sequence code are used as measures to improve the security level of the network. It is noticed in the results in Table 1 and Table 2 that the structure of the crypto algorithms effect on security level. The structure and controlling of the algorithm effect on security level.
  • 6. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016 6 Table 2. The Modelling Results of Hybrid Algorithm Using Mamdani Style. • The fuzzy logic is used to evaluate the complexity of the wireless network, then the given parameters of the conventional algorithm, the key length of stream cipher algorithm, and sequence code for modelling are used to choose more secure algorithms and select a secure structure. Fuzzy logics have facility tools to evaluate the security of the network. • Some novelties of this work compared to the others designs, are: a. in this work the security evaluation of network based on five metrics of cryptographic algorithms are used, while other projects have used only three metrics. b. compare to existing modelling and techniques that are used, the model which is used in this work has more facility. 5. CONCLUSIONS The hybrid algorithm is proposed and used to secure information in the wireless network design for data package transfer between the nodes. 65 mobile node wireless networks for the network simulation are constructed and NS2 is employed to study and analyse the performance of the network. The evaluation modelling results reveal that a comprehensive security model is required to develop the security of wireless network systems. As the security of wireless network is still a complicated process, it needs a periodical evaluation. Utilizing the fuzzy logic for the evaluation of the complexity of the wireless network, we proved that the hybrid system is more complex than conventional system for security in the wireless network and it has a better performance.
  • 7. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016 7 REFERENCES [1] J. Markus, Y. Moti, & Z. Jianying, (2004) Applied Cryptography and Network Security, Berlin Heidelberg: Springer-Verlag. [2] S. William, (2011) Network Security Essential: Application and Standards, United States of America: Fourth Edition. [3] S. Mohammed & S. Sadkhan, (2013) “Block cipher security evaluation based on fuzzy logic,” in The First International Conference of Electrical, Communication, Computer, Power and Control Engineering (ICECCPCE), Iraq, Mosul. [4] I. Teerawat & H. Ekram, (2008) Introduction to Network Simulator NS2, United States of America: Second Edition. [5] M. Matin, (2009) “Performance evaluation symmetric encryption algorithm in MANNET and WLAN,” in International Conference for Technical Postgraduates (TECHPOS), Kuala Lumpur, pp. 1- 4. [6] J. Fu, L. Huang, & Y. Yao, (2010) “Application of BP neural network in wireless network security evaluation,” in IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), Beijing, China, pp. 592-596. [7] G. Germano, et al. (2005) “Evaluation of Security Mechanisms in Wireless Sensor Networks,” in Proceedings of the Systems Communications (ICW05), p.1-6. [8] G. E. Almargni & G. Abdalla, (2012) “Design and simulation of wireless network using NS2,” in second International Conference on Computer Science and Information Technology (ICCSIT), Singapore, pp. 157-161. [9] Alanazi Hamdan.O., Zaidan B.B., Zaidan A.A., Jalab Hamid A., Shabbir M. and Al-Nabhani Y., (2010) " New Comparative Study Between DES, 3DES and AES within Nine Factors" , Journal of Computing , Volume 2, issue 3, pp. 152-157. [10] Ezreik Almargni, Gheryani Abdalla, (2012) "Design and Simulation of Wireless Network using NS2", second International Conference on Computer Science and Information Technology (ICCSIT'2012) Singapore, pp.157-161. [11] Jinjing ZHAO, Yan WEN, and Dongxia WANG, (2011) "A Network Security Evaluation Method Framework Based on Multiple Criteria Dicision Making Theory", Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IEEE computer society, PP. 371- 375. [12] Singh Rajender, Misra Rahul , and Kumar Vikas , (2013) "Analysis the Impact of Symmetric cryptographic Algorithms on Power Consumption for various data types", International Journal on Recent and Innovation Trends in Computing and Communication, Volume: 1 Issue: 4, pp 221-226. [13] Verma Harsh Kumar, Singh Ravindra Kumar, (2012) "Performance Analysis of RC5, Blowfish and DES Block Cipher Algorithms", International Journal of Computer Applications, Volume 42, No.16, PP. 8-14. [14] A. Menezes, P. van Oorschot, & S. Vanstone, (1996) Handbook of Applied Cryptography, CRC Press, 1996. [15] S. William, (2011) Cryptography and Network Security, United States of America: Fifth Edition.
  • 8. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016 8 AUTHORS Sirwan Mohammed has received the B.S. in Electrical Engineering from University of Salahaddin, in 2005, and the M.S. in Computer and Automation from University of Slemani, Kurdistan of Iraq, in 2014. He is currently a CNS/ATM manager at Sulaimaniyah International Airport. Mr. Mohammed is an IEEE student member and he is also a member of Union Engineering of Kurdistan. He has been working as telecommunication engineer for more than ten years for Sulaimaniyah International Airport. His research interest is security, telecommunication and networks. He is the co-author of multiple publication in IEEE conferences and other relevant conferences. Majeed Nader has received the B.Sc. in electrical engineering from University of Salahaddin in 2005, the M.Sc. in Electronic and Communication Engineering from University of Slemani in 2009, in Iraq. He also has earned M.S in Computer Engineering from Wayne State University, Michigan, USA. He is currently a Ph.D. Candidate in ECE department and a pert time faculty in Engineering technology in Wayne State University. Mr. Nader is an IEEE member. He has worked as Telecommunication Engineer for 7 years and he is currently a senior Electrical Engineer. He is an honoured member of Tau Beta Pi in USA. Mr. Nader’s research interest is processor design, FPGA, and Embedded Network system for automotive applications.
  翻译: