SlideShare a Scribd company logo
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 7, Issue 6 (Sep. - Oct. 2013), PP 63-70
www.iosrjournals.org
www.iosrjournals.org 63 | Page
Wireless Network Security Architecture with Blowfish Encryption
Model
Subrahmanyeswararao Maradani1
, Seetharamanjaneyulu Babburi2
1
Dept. of E.C.E, VignanUniversity, Andhra Pradesh, India 2
Dept. of E.C.E, VignanUniversity, Andhra Pradesh,
India
Abstract: In this research paper ,we developed a model for a large network, wireless nodes are
interconnected and each can be considered as a node processor that offer services to other node processors
connected to a specific network. A very high proportion of the nodes that offer services need to carry out an
authentication process so as to make an access request to the node offering the service. In this context, an
integrated reconfigurable network security architecture moved to the application layer has become the need of
the day for secure wireless data sharing. The security schemes of the seven layer OSI architecture need to be
placed intrinsically in the wireless node itself and should be capable of supporting the MAC layer, IP address
based layer and the routing protocols of the network layer. This work focuses on the use of emulator and
embedded hardware architectures for wireless network security. In this work, the individual nodes can have a
unique security signature pattern maintained by respective wireless nodes using an encryption algorithm and
this is made dynamic. The metrics includes latency, throughput, Scalability, Effects of data transfer operation
on node processor and application data located in the processor
Keywords:Wireless Network security, Embedded hardware, Reconfigurable architecture, blowfish algorithm
I. Introduction
The researchers have agreed that security is very significant issue for network where difficult to
manage whole network at a time with all users. Security can be implemented at various levels of the
intercommunications which are established on a physical layer and goes up via the data link, network, and
transport layers up to the topmost application layer. In this research work, the nodes can be dynamic and can
join or leave a network at any time. In order to withstand malicious attacks, the end-to-end
communication is secured using cryptographically strong authentication. The attacks can transmit
malicious information from a node to the destination to intercept information and unwanted attacks can
record packets at a location in the network to secure data
1.1 Application Layer Security with Embedded System
An application layer security application is secure shell, which allows a secure login for administration
and monitoring purposes. A possible security approach at the application level is to authenticate and encrypt
the information packages from secure system, but be aware that additional protection avoids replay attacks.
An embedded system based wireless node architecture is shown in Figure 1.
Fig. 1.Example embedded system based wireless node architecture
Wireless Network Security Architecture with Blowfish Encryption Model
www.iosrjournals.org 64 | Page
II. Data Structure
2.1 Communication in MAC layer
Table.1.Data Structure in Mac Layer
Source MAC Destination MAC Beacon Raw Data 32-Bit
Authenticating
(6 bytes) (6 bytes) (1 byte) (N bytes) (4 bytes)
The data structure for nodes communicating in the MAC layer i.e., either Physical (or) Data link layer consists of
the header MAC info and authenticating 32-bit code at the end of frame. The total size is 6+6+2+N+4bytes (refer
Table I). This data structure is maintained for the network layer also
2.2 Communication in Upper layer [i.e. above MAC layer
Layer 4-7 services, sometimes referred to as the Upper layers, support end-to-end communication
between a source and destination application and are used whenever a message passes from or to a user the data
structure for nodes communicating in the Upper layer i.e., either UDP (or) session (or) Presentation layer
consists of the header IP address info, MAC address info and subnet Mask address (refer Table 2).
Table. 2. Data Structure in Upper Layer
Source IP Destination IP source MAC Destination MAC Subnet Mask
(6 bytes) (6 bytes) (6 bytes) (6 bytes)
The Upper layer Communication is made asynchronous and is hence faster. The following metrics have been
studied: (i) throughput (ii) packet size (iii) Input file size (iv) Delay between packets etc.
III. Hardware
In this work, self powered nodes are used: either one as the server and the other as the client connected
to each other via the Ethernet cable. The hardware used is ARM based architecture clocked at 120 MHz and
has special feature of SDRAM to access the external memory. The features available are a LCD panel controller,
an Ethernet MAC, a USB device interface, UART, SD card with the sample file for transfer residing in it.
IV. Performance Metrics
The metrics studied includes: The packets sent, packets received, packets lost and throughput for
variable data size. The UDP senders will not get any feedback, and the data transfer is asynchronous. The UDP
tests reports the received packets, throughput and the transfer time. These traces are used to calculate the packet
lost and the efficiency. The UDP tests procedure involves the packets transfer in both the directions; therefore the
measurements are significant in both the sides. The difference between the bytes sent and received across both
the sides illustrates the actual volume of loss on the link.
4.1 Dynamic Parameters in Internode Communication
The user defined dynamic variables assigned includes MAC id user configurable, Ip address
user configurable, Subnet mask details user configurable, Variable packet size (upper layer), Session time out
and Delay or latency among the packets (throughput)
V. Data Encryption Model
Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a
large number of cipher suites and encryption products. Schneier designed Blowfish as a general-purpose
algorithm, intended as an alternative to the aging DES and free of the problems and constraints associated
with other algorithms. At the time Blowfish was released, many other designs were proprietary, encumbered by
patents or were commercials /government secrets. Blowfish is unpatented. The algorithm is placed in the
public domain, and can be freely used by anyone. Blowfish has a 64-bit block size and a variable key length
from 1 bit up to 448 bits. It is a 16-round Feistel cipher and uses large key-dependent S-boxes. Blowfish's key
schedule starts by initializing the P-array and S-boxes with values derived from the hexadecimal digits of pi,
which contain no obvious pattern. The secret key is then, byte by byte, cycling the key if necessary, XORed
with all the P-entries in order. A 64-bit all-zero block is then encrypted with the algorithm as it stands. The
resultant cipher text replaces P1 and P2. The same cipher text is then encrypted again with the new sub
Wireless Network Security Architecture with Blowfish Encryption Model
www.iosrjournals.org 65 | Page
keys, and P3 and P4 are replaced by the new cipher text. This continues, replacing the entire P-array and all the
S-box entries. In all, the Blowfish encryption algorithm will run 521 times to generate all the sub keys - about
4KB of data is processed.
5.1. Encryption Algorithm on Chip
In this research, the encryption algorithm discussed in section V is implemented in HY-LPC1788
ARM processor on the UDP layer. The dynamic parameters (refer table 1and table 2) are declared in a separate
header file. The „c‟ file is written in keil compiler; a hex file is created and downloaded into the
hardware. The communication results among the two mobile hardware nodes are shown in appendix -1 and
appendix -2. The pseudo code of the key box selection function, encryption and decryption functions are
presented below:
5.1 Error detection mechanism First match for MAC id If
{ yes
Then
Recalculate authentication code at receiver and compare with received code If yes
Accept data } Else
Give –ve ack.
5.2 Key box selection pseudo code
unsigned long F(BLOWFISH_CTX *ctx, unsigned long x) {
unsigned short a, b, c, d; unsigned long y;
d = x & 0x00FF; x >>= 8;
c = x & 0x00FF; x >>= 8;
b = x & 0x00FF; x >>= 8;
a = x & 0x00FF;
y = ctx->S[0][a] + ctx->S[1][b]; y = y ^ ctx->S[2][c];
y = y + ctx->S[3][d]; return y;
}
5.3 Encryption pseudo code
void Blowfish_Encrypt(BLOWFISH_CTX *ctx, unsigned long *xl, unsigned long *xr) {
unsigned long Xl; unsigned long Xr; unsigned long temp; short i;
Xl = *xl; Xr = *xr;
for (i = 0; i < N; ++i) {
Xl = Xl ^ ctx->P[i]; Xr = F(ctx, Xl) ^ Xr; temp = Xl;
Xl = Xr; Xr = temp; }
temp = Xl; Xl = Xr; Xr = temp;
Xr = Xr ^ ctx->P[N];
Xl = Xl ^ ctx->P[N + 1]; *xl = Xl;
*xr = Xr;
}
5.4 Decryption pseudo code
void Blowfish_Decrypt(BLOWFISH_CTX *ctx, unsigned long *xl, unsigned long *xr) {
unsigned long Xl; unsigned long Xr; unsigned long temp; short i;
Xl = *xl; Xr = *xr;
for (i = N + 1; i > 1; --i) {
Xl = Xl ^ ctx->P[i]; Xr = F(ctx, Xl) ^ Xr;
/* Exchange Xl and Xr */ temp = Xl;
Xl = Xr; Xr = temp; }
/* Exchange Xl and Xr */ temp = Xl;
Xl = Xr; Xr = temp;
Xr = Xr ^ ctx->P[1]; Xl = Xl ^ ctx->P[0]; *xl = Xl;
*xr = Xr; }
Wireless Network Security Architecture with Blowfish Encryption Model
www.iosrjournals.org 66 | Page
VI. Results and Discussion
6.1 Variable file size, fixed delay and packet length
Case 1: The link, file and network parameters chosen for study in this work are listed in Table 3.
Table. 3. Link, File and Network Parameters
Packet Length Delay
64 bytes 600 ms
File Size
F1< F2 < F3
Wireless Network Security Architecture with Blowfish Encryption Model
www.iosrjournals.org 67 | Page
The parameters studied are the throughput, packets sent, packets received and the transfer time are shown in
figure 2 to figure 5. The packets sent and received are the same for the respective data size. Ex: for the file
size of 104KB the packets sent and received is 108191 for the fixed delay of 600ms i.e. packets sent from the
server and that received at the client end are the same : no packets lost for the delay of 600ms. From the graph it
can be inferred that the throughput (has smaller values) becomes smaller as the file size increases. The packets
sent, packets received and the transfer time increases as the file size increases.
Fig. 2. File size (Kilo bytes) Vs throughput sent (bytes/sec); (bytes); Delay = 600ms, Packet length = 64 bytes
Fig. 3. File size (Kilo bytes) Vs packets Delay = 600ms, Packet length = 64 bytes
Fig. 4.File size (Kilo bytes) Vs packets received (bytes); Delay = 600ms, Packet length = 64 bytes
Fig. 5. File size (Kilo bytes) Vs transfer time (seconds); Delay = 600ms, Packet length = 64 bytes
Wireless Network Security Architecture with Blowfish Encryption Model
www.iosrjournals.org 68 | Page
Case 2: The second set of link, file and network parameters chosen for study in this work are listed in Table 4.
Table. 4. Second set of link, file and network parameters
It is observed that the packets sent, packets received and the transfer time increases as the file size increases and
is shown in figure 6-9. The throughput decreases as the file size increases. In this scenario it is observed that the
no. of packets sent from server are not correctly received at the client end i.e. there is packet loss but the packets
loss is constant for variable file size.
Fig. 6. File size (Kilo bytes) Vs throughput sent (bytes/seconds); Delay = 300ms, Packet length = 64 bytes
Fig. 7. File size (Kilo bytes) Vs packets (bytes); Delay = 300ms, Packet length = 64 bytes
Fig. 8. File size (Kilo bytes) Vs packets received (bytes)Delay = 300ms, Packet length= 64 bytes
Wireless Network Security Architecture with Blowfish Encryption Model
www.iosrjournals.org 69 | Page
Fig. 9. File size (Kilo bytes) Vs transfer time(seconds); Delay = 300ms, Packet length= 64 bytes
Case 3: Encrypted Module Output
The data encryption and decryption module implemented in Netwinz Emulator is shown in figure 10 for trusted
node figure 11 for untrusted node.
Fig. 10.Trusted Node Encrypted data transfer
Fig. 11.untrusted Node Encrypted data transfer
Case 4: Chip implementation of encryption data transfer
The hardware nodes with the encryption algorithm (blowfish based) is set up in the two hardware
nodes and is shown in appendix -1. In appendix -2 the transfer of data from node 1 (source) to node 2
(receiver) is shown. Similarly data can be transferred from node2 ( as Source) to node1 ( as receiver)
VII. Conclusion
In this work, the metrics for the wireless based data transfer among nodes is studied. For authenticated
data transfer, an encryption algorithm using blowfish algorithm is discussed. Stand alone Hardware
implementation of individual nodes using ARM processor is also done. From the study, it can be concluded that
for the delay of 600ms the packets received and sent are identical i.e. no loss. The packets loss decreases as the
delay increases and is zero for a delay of 600ms. The throughput also decreases as the delay increases. Even for
the larger file size (> 104KB) the throughput is smaller but packets loss is less.
Wireless Network Security Architecture with Blowfish Encryption Model
www.iosrjournals.org 70 | Page
References
[1] A. F. Dana, R. Gowaikar, R. Palanki, B. Hassibi and M. Effros, “Capacity of wireless erasure networks”, IEEE Transaction Information
Theory, vol. 52, no. 3, pp. 789–804, 2006.
[2] A. Shokrollahi and R. Storn, “Design of efficient erasure codes with differential evolution”, in Proc. International Symposium
Information Theory, Sorrento, Italy, June 2000.
[3] C. Cachin and M. Geisler, “Integrity protection for revision control”, in M. Abdalla and D. Pointcheval, editors, Proc. Applied
Cryptography and Network Security (ACNS), vol. 5536 of Lecture Notes in Computer Science, pages 382–399, 2009.
[4] C. Cachin, A. Shelat, and A. Shraer, “Efficient fork-linearizable access to untrusted shared memory”, in Proc. 26th ACM Symposium
on Principles of Distributed Computing (PODC), pages 129–138, 2007.
[5] D. L. Rosenband, “Synthesis of multi-cycle operation-centric descriptions”, Ph.D. Dissertation Proposal, Massachusetts Institute of
Technology, June 2000.
[6] D. J. C. MacKay, “Good error correcting codes based on very sparse matrices”, IEEE Transactions Information Theory, vol. 45, pp.
399–431, Mar. 1999
[7J. Wang, L. Dolecek and R.D. Wesel, “Controlling LDPC absorbing sets via the null space of the cycle consistency matrix”, in Proc.
IEEE International Conference on Communication (ICC), Kyoto, Japan, Jun. 2011.
APPENDIX-1 (Communication established for encrypted data transfer between two nodes in hardware
APPENDIX -2(Hardware node 1 acts as transmitter and hardware node 2 as receiver)
Ad

More Related Content

What's hot (20)

Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
Shivam Singh
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
Final report
Final reportFinal report
Final report
Jagbir Kalirai
 
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
IJECEIAES
 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
IJNSA Journal
 
40520130101005
4052013010100540520130101005
40520130101005
IAEME Publication
 
B03302007012
B03302007012B03302007012
B03302007012
theijes
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
caijjournal
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
IDES Editor
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
IJNSA Journal
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
Editor IJARCET
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
IJCSIS Research Publications
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
Alexander Decker
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
Alexander Decker
 
A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...
Sajedul Karim
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
 
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
Abhishek Majumdar
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
Shivam Singh
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...
IJECEIAES
 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
IJNSA Journal
 
B03302007012
B03302007012B03302007012
B03302007012
theijes
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
caijjournal
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
IDES Editor
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
IJNSA Journal
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
Editor IJARCET
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
IJCSIS Research Publications
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
Alexander Decker
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
Alexander Decker
 
A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...A new DNA encryption technique for secure data transmission with authenticati...
A new DNA encryption technique for secure data transmission with authenticati...
Sajedul Karim
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
 
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON  DNA CRYPTOGRAPHY
A NEW APPROACH TOWARDS INFORMATION SECURITY BASED ON DNA CRYPTOGRAPHY
Abhishek Majumdar
 

Viewers also liked (20)

Structure and transport coefficients of liquid Argon and neon using molecular...
Structure and transport coefficients of liquid Argon and neon using molecular...Structure and transport coefficients of liquid Argon and neon using molecular...
Structure and transport coefficients of liquid Argon and neon using molecular...
IOSR Journals
 
Effect of Planar Solid Shear Wall - Frame Arrangement on the Deformation Beha...
Effect of Planar Solid Shear Wall - Frame Arrangement on the Deformation Beha...Effect of Planar Solid Shear Wall - Frame Arrangement on the Deformation Beha...
Effect of Planar Solid Shear Wall - Frame Arrangement on the Deformation Beha...
IOSR Journals
 
Effect of Fly Ash Particles on the Mechanical Properties of Zn-22%Al Alloy vi...
Effect of Fly Ash Particles on the Mechanical Properties of Zn-22%Al Alloy vi...Effect of Fly Ash Particles on the Mechanical Properties of Zn-22%Al Alloy vi...
Effect of Fly Ash Particles on the Mechanical Properties of Zn-22%Al Alloy vi...
IOSR Journals
 
NOx Reduction of Diesel Engine with Madhuca Indica biodiesel using Selective ...
NOx Reduction of Diesel Engine with Madhuca Indica biodiesel using Selective ...NOx Reduction of Diesel Engine with Madhuca Indica biodiesel using Selective ...
NOx Reduction of Diesel Engine with Madhuca Indica biodiesel using Selective ...
IOSR Journals
 
Data mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant AnalysisData mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant Analysis
IOSR Journals
 
Development of Automatic PV Power Pack Servo Based Single Axis Solar Tracking...
Development of Automatic PV Power Pack Servo Based Single Axis Solar Tracking...Development of Automatic PV Power Pack Servo Based Single Axis Solar Tracking...
Development of Automatic PV Power Pack Servo Based Single Axis Solar Tracking...
IOSR Journals
 
Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...
Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...
Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...
IOSR Journals
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
IOSR Journals
 
Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...
Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...
Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...
IOSR Journals
 
Uniform Order Legendre Approach for Continuous Hybrid Block Methods for the S...
Uniform Order Legendre Approach for Continuous Hybrid Block Methods for the S...Uniform Order Legendre Approach for Continuous Hybrid Block Methods for the S...
Uniform Order Legendre Approach for Continuous Hybrid Block Methods for the S...
IOSR Journals
 
Aisha Email System
Aisha Email SystemAisha Email System
Aisha Email System
IOSR Journals
 
Effect of Poling Field and Non-linearity in Quantum Breathers in Ferroelectrics
Effect of Poling Field and Non-linearity in Quantum Breathers in FerroelectricsEffect of Poling Field and Non-linearity in Quantum Breathers in Ferroelectrics
Effect of Poling Field and Non-linearity in Quantum Breathers in Ferroelectrics
IOSR Journals
 
Electromagnetic fields of time-dependent magnetic monopole
Electromagnetic fields of time-dependent magnetic monopoleElectromagnetic fields of time-dependent magnetic monopole
Electromagnetic fields of time-dependent magnetic monopole
IOSR Journals
 
I0744347
I0744347I0744347
I0744347
IOSR Journals
 
Structural elucidation, Identification, quantization of process related impur...
Structural elucidation, Identification, quantization of process related impur...Structural elucidation, Identification, quantization of process related impur...
Structural elucidation, Identification, quantization of process related impur...
IOSR Journals
 
To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...
To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...
To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...
IOSR Journals
 
Numerical solution of heat equation through double interpolation
Numerical solution of heat equation through double interpolationNumerical solution of heat equation through double interpolation
Numerical solution of heat equation through double interpolation
IOSR Journals
 
Determination of baseline Widal titre among apparently healthy population in ...
Determination of baseline Widal titre among apparently healthy population in ...Determination of baseline Widal titre among apparently healthy population in ...
Determination of baseline Widal titre among apparently healthy population in ...
IOSR Journals
 
Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.
Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.
Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.
IOSR Journals
 
Structure and transport coefficients of liquid Argon and neon using molecular...
Structure and transport coefficients of liquid Argon and neon using molecular...Structure and transport coefficients of liquid Argon and neon using molecular...
Structure and transport coefficients of liquid Argon and neon using molecular...
IOSR Journals
 
Effect of Planar Solid Shear Wall - Frame Arrangement on the Deformation Beha...
Effect of Planar Solid Shear Wall - Frame Arrangement on the Deformation Beha...Effect of Planar Solid Shear Wall - Frame Arrangement on the Deformation Beha...
Effect of Planar Solid Shear Wall - Frame Arrangement on the Deformation Beha...
IOSR Journals
 
Effect of Fly Ash Particles on the Mechanical Properties of Zn-22%Al Alloy vi...
Effect of Fly Ash Particles on the Mechanical Properties of Zn-22%Al Alloy vi...Effect of Fly Ash Particles on the Mechanical Properties of Zn-22%Al Alloy vi...
Effect of Fly Ash Particles on the Mechanical Properties of Zn-22%Al Alloy vi...
IOSR Journals
 
NOx Reduction of Diesel Engine with Madhuca Indica biodiesel using Selective ...
NOx Reduction of Diesel Engine with Madhuca Indica biodiesel using Selective ...NOx Reduction of Diesel Engine with Madhuca Indica biodiesel using Selective ...
NOx Reduction of Diesel Engine with Madhuca Indica biodiesel using Selective ...
IOSR Journals
 
Data mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant AnalysisData mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant Analysis
IOSR Journals
 
Development of Automatic PV Power Pack Servo Based Single Axis Solar Tracking...
Development of Automatic PV Power Pack Servo Based Single Axis Solar Tracking...Development of Automatic PV Power Pack Servo Based Single Axis Solar Tracking...
Development of Automatic PV Power Pack Servo Based Single Axis Solar Tracking...
IOSR Journals
 
Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...
Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...
Schedulability Analysis for a Combination of Non-Preemptive Strict Periodic T...
IOSR Journals
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
Analysis of Multimedia Traffic Performance in a Multi-Class traffic environme...
IOSR Journals
 
Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...
Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...
Identification of Skeleton of Monoterpenoids from 13CNMR Data Using Generaliz...
IOSR Journals
 
Uniform Order Legendre Approach for Continuous Hybrid Block Methods for the S...
Uniform Order Legendre Approach for Continuous Hybrid Block Methods for the S...Uniform Order Legendre Approach for Continuous Hybrid Block Methods for the S...
Uniform Order Legendre Approach for Continuous Hybrid Block Methods for the S...
IOSR Journals
 
Effect of Poling Field and Non-linearity in Quantum Breathers in Ferroelectrics
Effect of Poling Field and Non-linearity in Quantum Breathers in FerroelectricsEffect of Poling Field and Non-linearity in Quantum Breathers in Ferroelectrics
Effect of Poling Field and Non-linearity in Quantum Breathers in Ferroelectrics
IOSR Journals
 
Electromagnetic fields of time-dependent magnetic monopole
Electromagnetic fields of time-dependent magnetic monopoleElectromagnetic fields of time-dependent magnetic monopole
Electromagnetic fields of time-dependent magnetic monopole
IOSR Journals
 
Structural elucidation, Identification, quantization of process related impur...
Structural elucidation, Identification, quantization of process related impur...Structural elucidation, Identification, quantization of process related impur...
Structural elucidation, Identification, quantization of process related impur...
IOSR Journals
 
To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...
To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...
To Study the Efficacy of Electromyographic Biofeedback Training on Dynamic Eq...
IOSR Journals
 
Numerical solution of heat equation through double interpolation
Numerical solution of heat equation through double interpolationNumerical solution of heat equation through double interpolation
Numerical solution of heat equation through double interpolation
IOSR Journals
 
Determination of baseline Widal titre among apparently healthy population in ...
Determination of baseline Widal titre among apparently healthy population in ...Determination of baseline Widal titre among apparently healthy population in ...
Determination of baseline Widal titre among apparently healthy population in ...
IOSR Journals
 
Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.
Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.
Antibiotic Susceptibility Pattern of Pyogenic Bacterial Isolates in Sputum.
IOSR Journals
 
Ad

Similar to Wireless Network Security Architecture with Blowfish Encryption Model (20)

Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
Universitas Pembangunan Panca Budi
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
idescitation
 
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET Journal
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
AdiseshaK
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
Prof. Dr. K. Adisesha
 
CNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfCNS Solutions-Adi.pdf
CNS Solutions-Adi.pdf
AdiseshaK
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
IJERA Editor
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
IJNSA Journal
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
IJNSA Journal
 
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
ijircee
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
IJERA Editor
 
Fog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish CipherFog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish Cipher
BRNSSPublicationHubI
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networks
IAEME Publication
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system
IJECEIAES
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
idescitation
 
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET Journal
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
AdiseshaK
 
CNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfCNS Solutions-Adi.pdf
CNS Solutions-Adi.pdf
AdiseshaK
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
IJNSA Journal
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
IJNSA Journal
 
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed DatabasesEfficient Data Mining Of Association Rules in Horizontally Distributed Databases
Efficient Data Mining Of Association Rules in Horizontally Distributed Databases
ijircee
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
IJERA Editor
 
Fog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish CipherFog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish Cipher
BRNSSPublicationHubI
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networks
IAEME Publication
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system
IJECEIAES
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
 
Ad

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

Recently uploaded (20)

Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
Guru Nanak Technical Institutions
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .
NABLAS株式会社
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
Reflections on Morality, Philosophy, and History
 
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
AI Publications
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .
NABLAS株式会社
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
AI Publications
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 

Wireless Network Security Architecture with Blowfish Encryption Model

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 7, Issue 6 (Sep. - Oct. 2013), PP 63-70 www.iosrjournals.org www.iosrjournals.org 63 | Page Wireless Network Security Architecture with Blowfish Encryption Model Subrahmanyeswararao Maradani1 , Seetharamanjaneyulu Babburi2 1 Dept. of E.C.E, VignanUniversity, Andhra Pradesh, India 2 Dept. of E.C.E, VignanUniversity, Andhra Pradesh, India Abstract: In this research paper ,we developed a model for a large network, wireless nodes are interconnected and each can be considered as a node processor that offer services to other node processors connected to a specific network. A very high proportion of the nodes that offer services need to carry out an authentication process so as to make an access request to the node offering the service. In this context, an integrated reconfigurable network security architecture moved to the application layer has become the need of the day for secure wireless data sharing. The security schemes of the seven layer OSI architecture need to be placed intrinsically in the wireless node itself and should be capable of supporting the MAC layer, IP address based layer and the routing protocols of the network layer. This work focuses on the use of emulator and embedded hardware architectures for wireless network security. In this work, the individual nodes can have a unique security signature pattern maintained by respective wireless nodes using an encryption algorithm and this is made dynamic. The metrics includes latency, throughput, Scalability, Effects of data transfer operation on node processor and application data located in the processor Keywords:Wireless Network security, Embedded hardware, Reconfigurable architecture, blowfish algorithm I. Introduction The researchers have agreed that security is very significant issue for network where difficult to manage whole network at a time with all users. Security can be implemented at various levels of the intercommunications which are established on a physical layer and goes up via the data link, network, and transport layers up to the topmost application layer. In this research work, the nodes can be dynamic and can join or leave a network at any time. In order to withstand malicious attacks, the end-to-end communication is secured using cryptographically strong authentication. The attacks can transmit malicious information from a node to the destination to intercept information and unwanted attacks can record packets at a location in the network to secure data 1.1 Application Layer Security with Embedded System An application layer security application is secure shell, which allows a secure login for administration and monitoring purposes. A possible security approach at the application level is to authenticate and encrypt the information packages from secure system, but be aware that additional protection avoids replay attacks. An embedded system based wireless node architecture is shown in Figure 1. Fig. 1.Example embedded system based wireless node architecture
  • 2. Wireless Network Security Architecture with Blowfish Encryption Model www.iosrjournals.org 64 | Page II. Data Structure 2.1 Communication in MAC layer Table.1.Data Structure in Mac Layer Source MAC Destination MAC Beacon Raw Data 32-Bit Authenticating (6 bytes) (6 bytes) (1 byte) (N bytes) (4 bytes) The data structure for nodes communicating in the MAC layer i.e., either Physical (or) Data link layer consists of the header MAC info and authenticating 32-bit code at the end of frame. The total size is 6+6+2+N+4bytes (refer Table I). This data structure is maintained for the network layer also 2.2 Communication in Upper layer [i.e. above MAC layer Layer 4-7 services, sometimes referred to as the Upper layers, support end-to-end communication between a source and destination application and are used whenever a message passes from or to a user the data structure for nodes communicating in the Upper layer i.e., either UDP (or) session (or) Presentation layer consists of the header IP address info, MAC address info and subnet Mask address (refer Table 2). Table. 2. Data Structure in Upper Layer Source IP Destination IP source MAC Destination MAC Subnet Mask (6 bytes) (6 bytes) (6 bytes) (6 bytes) The Upper layer Communication is made asynchronous and is hence faster. The following metrics have been studied: (i) throughput (ii) packet size (iii) Input file size (iv) Delay between packets etc. III. Hardware In this work, self powered nodes are used: either one as the server and the other as the client connected to each other via the Ethernet cable. The hardware used is ARM based architecture clocked at 120 MHz and has special feature of SDRAM to access the external memory. The features available are a LCD panel controller, an Ethernet MAC, a USB device interface, UART, SD card with the sample file for transfer residing in it. IV. Performance Metrics The metrics studied includes: The packets sent, packets received, packets lost and throughput for variable data size. The UDP senders will not get any feedback, and the data transfer is asynchronous. The UDP tests reports the received packets, throughput and the transfer time. These traces are used to calculate the packet lost and the efficiency. The UDP tests procedure involves the packets transfer in both the directions; therefore the measurements are significant in both the sides. The difference between the bytes sent and received across both the sides illustrates the actual volume of loss on the link. 4.1 Dynamic Parameters in Internode Communication The user defined dynamic variables assigned includes MAC id user configurable, Ip address user configurable, Subnet mask details user configurable, Variable packet size (upper layer), Session time out and Delay or latency among the packets (throughput) V. Data Encryption Model Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products. Schneier designed Blowfish as a general-purpose algorithm, intended as an alternative to the aging DES and free of the problems and constraints associated with other algorithms. At the time Blowfish was released, many other designs were proprietary, encumbered by patents or were commercials /government secrets. Blowfish is unpatented. The algorithm is placed in the public domain, and can be freely used by anyone. Blowfish has a 64-bit block size and a variable key length from 1 bit up to 448 bits. It is a 16-round Feistel cipher and uses large key-dependent S-boxes. Blowfish's key schedule starts by initializing the P-array and S-boxes with values derived from the hexadecimal digits of pi, which contain no obvious pattern. The secret key is then, byte by byte, cycling the key if necessary, XORed with all the P-entries in order. A 64-bit all-zero block is then encrypted with the algorithm as it stands. The resultant cipher text replaces P1 and P2. The same cipher text is then encrypted again with the new sub
  • 3. Wireless Network Security Architecture with Blowfish Encryption Model www.iosrjournals.org 65 | Page keys, and P3 and P4 are replaced by the new cipher text. This continues, replacing the entire P-array and all the S-box entries. In all, the Blowfish encryption algorithm will run 521 times to generate all the sub keys - about 4KB of data is processed. 5.1. Encryption Algorithm on Chip In this research, the encryption algorithm discussed in section V is implemented in HY-LPC1788 ARM processor on the UDP layer. The dynamic parameters (refer table 1and table 2) are declared in a separate header file. The „c‟ file is written in keil compiler; a hex file is created and downloaded into the hardware. The communication results among the two mobile hardware nodes are shown in appendix -1 and appendix -2. The pseudo code of the key box selection function, encryption and decryption functions are presented below: 5.1 Error detection mechanism First match for MAC id If { yes Then Recalculate authentication code at receiver and compare with received code If yes Accept data } Else Give –ve ack. 5.2 Key box selection pseudo code unsigned long F(BLOWFISH_CTX *ctx, unsigned long x) { unsigned short a, b, c, d; unsigned long y; d = x & 0x00FF; x >>= 8; c = x & 0x00FF; x >>= 8; b = x & 0x00FF; x >>= 8; a = x & 0x00FF; y = ctx->S[0][a] + ctx->S[1][b]; y = y ^ ctx->S[2][c]; y = y + ctx->S[3][d]; return y; } 5.3 Encryption pseudo code void Blowfish_Encrypt(BLOWFISH_CTX *ctx, unsigned long *xl, unsigned long *xr) { unsigned long Xl; unsigned long Xr; unsigned long temp; short i; Xl = *xl; Xr = *xr; for (i = 0; i < N; ++i) { Xl = Xl ^ ctx->P[i]; Xr = F(ctx, Xl) ^ Xr; temp = Xl; Xl = Xr; Xr = temp; } temp = Xl; Xl = Xr; Xr = temp; Xr = Xr ^ ctx->P[N]; Xl = Xl ^ ctx->P[N + 1]; *xl = Xl; *xr = Xr; } 5.4 Decryption pseudo code void Blowfish_Decrypt(BLOWFISH_CTX *ctx, unsigned long *xl, unsigned long *xr) { unsigned long Xl; unsigned long Xr; unsigned long temp; short i; Xl = *xl; Xr = *xr; for (i = N + 1; i > 1; --i) { Xl = Xl ^ ctx->P[i]; Xr = F(ctx, Xl) ^ Xr; /* Exchange Xl and Xr */ temp = Xl; Xl = Xr; Xr = temp; } /* Exchange Xl and Xr */ temp = Xl; Xl = Xr; Xr = temp; Xr = Xr ^ ctx->P[1]; Xl = Xl ^ ctx->P[0]; *xl = Xl; *xr = Xr; }
  • 4. Wireless Network Security Architecture with Blowfish Encryption Model www.iosrjournals.org 66 | Page VI. Results and Discussion 6.1 Variable file size, fixed delay and packet length Case 1: The link, file and network parameters chosen for study in this work are listed in Table 3. Table. 3. Link, File and Network Parameters Packet Length Delay 64 bytes 600 ms File Size F1< F2 < F3
  • 5. Wireless Network Security Architecture with Blowfish Encryption Model www.iosrjournals.org 67 | Page The parameters studied are the throughput, packets sent, packets received and the transfer time are shown in figure 2 to figure 5. The packets sent and received are the same for the respective data size. Ex: for the file size of 104KB the packets sent and received is 108191 for the fixed delay of 600ms i.e. packets sent from the server and that received at the client end are the same : no packets lost for the delay of 600ms. From the graph it can be inferred that the throughput (has smaller values) becomes smaller as the file size increases. The packets sent, packets received and the transfer time increases as the file size increases. Fig. 2. File size (Kilo bytes) Vs throughput sent (bytes/sec); (bytes); Delay = 600ms, Packet length = 64 bytes Fig. 3. File size (Kilo bytes) Vs packets Delay = 600ms, Packet length = 64 bytes Fig. 4.File size (Kilo bytes) Vs packets received (bytes); Delay = 600ms, Packet length = 64 bytes Fig. 5. File size (Kilo bytes) Vs transfer time (seconds); Delay = 600ms, Packet length = 64 bytes
  • 6. Wireless Network Security Architecture with Blowfish Encryption Model www.iosrjournals.org 68 | Page Case 2: The second set of link, file and network parameters chosen for study in this work are listed in Table 4. Table. 4. Second set of link, file and network parameters It is observed that the packets sent, packets received and the transfer time increases as the file size increases and is shown in figure 6-9. The throughput decreases as the file size increases. In this scenario it is observed that the no. of packets sent from server are not correctly received at the client end i.e. there is packet loss but the packets loss is constant for variable file size. Fig. 6. File size (Kilo bytes) Vs throughput sent (bytes/seconds); Delay = 300ms, Packet length = 64 bytes Fig. 7. File size (Kilo bytes) Vs packets (bytes); Delay = 300ms, Packet length = 64 bytes Fig. 8. File size (Kilo bytes) Vs packets received (bytes)Delay = 300ms, Packet length= 64 bytes
  • 7. Wireless Network Security Architecture with Blowfish Encryption Model www.iosrjournals.org 69 | Page Fig. 9. File size (Kilo bytes) Vs transfer time(seconds); Delay = 300ms, Packet length= 64 bytes Case 3: Encrypted Module Output The data encryption and decryption module implemented in Netwinz Emulator is shown in figure 10 for trusted node figure 11 for untrusted node. Fig. 10.Trusted Node Encrypted data transfer Fig. 11.untrusted Node Encrypted data transfer Case 4: Chip implementation of encryption data transfer The hardware nodes with the encryption algorithm (blowfish based) is set up in the two hardware nodes and is shown in appendix -1. In appendix -2 the transfer of data from node 1 (source) to node 2 (receiver) is shown. Similarly data can be transferred from node2 ( as Source) to node1 ( as receiver) VII. Conclusion In this work, the metrics for the wireless based data transfer among nodes is studied. For authenticated data transfer, an encryption algorithm using blowfish algorithm is discussed. Stand alone Hardware implementation of individual nodes using ARM processor is also done. From the study, it can be concluded that for the delay of 600ms the packets received and sent are identical i.e. no loss. The packets loss decreases as the delay increases and is zero for a delay of 600ms. The throughput also decreases as the delay increases. Even for the larger file size (> 104KB) the throughput is smaller but packets loss is less.
  • 8. Wireless Network Security Architecture with Blowfish Encryption Model www.iosrjournals.org 70 | Page References [1] A. F. Dana, R. Gowaikar, R. Palanki, B. Hassibi and M. Effros, “Capacity of wireless erasure networks”, IEEE Transaction Information Theory, vol. 52, no. 3, pp. 789–804, 2006. [2] A. Shokrollahi and R. Storn, “Design of efficient erasure codes with differential evolution”, in Proc. International Symposium Information Theory, Sorrento, Italy, June 2000. [3] C. Cachin and M. Geisler, “Integrity protection for revision control”, in M. Abdalla and D. Pointcheval, editors, Proc. Applied Cryptography and Network Security (ACNS), vol. 5536 of Lecture Notes in Computer Science, pages 382–399, 2009. [4] C. Cachin, A. Shelat, and A. Shraer, “Efficient fork-linearizable access to untrusted shared memory”, in Proc. 26th ACM Symposium on Principles of Distributed Computing (PODC), pages 129–138, 2007. [5] D. L. Rosenband, “Synthesis of multi-cycle operation-centric descriptions”, Ph.D. Dissertation Proposal, Massachusetts Institute of Technology, June 2000. [6] D. J. C. MacKay, “Good error correcting codes based on very sparse matrices”, IEEE Transactions Information Theory, vol. 45, pp. 399–431, Mar. 1999 [7J. Wang, L. Dolecek and R.D. Wesel, “Controlling LDPC absorbing sets via the null space of the cycle consistency matrix”, in Proc. IEEE International Conference on Communication (ICC), Kyoto, Japan, Jun. 2011. APPENDIX-1 (Communication established for encrypted data transfer between two nodes in hardware APPENDIX -2(Hardware node 1 acts as transmitter and hardware node 2 as receiver)
  翻译: