Open Access Open Access  Restricted Access Subscription Access

Improved Performance for MANETs using Cryptography

K. Thamizhmaran

Abstract


The idea behind network security and cryptography is to safeguard wireless networks and data transmission. The network administrator controls network security, which includes granting access to data within a network. Users can access information and programs within their authority by selecting or being given an ID, password, or other authenticating information.  Numerous computer networks, both public and private, that are utilized in daily tasks to carry out transactions and communications between companies, governmental organizations, and individuals are covered by network security. Some networks may be accessible to the general public, while others may be private, like those found within businesses. Organizations, businesses, and other kinds of institutions are all involved in network security. We also examined the fundamentals of cryptography in this paper. Cipher-based cryptographic systems are explained.


Full Text:

PDF

References


R. Huang and K. Sakurai “A robust and compression combined digital image encryption method based on compressive sensing”, 7th International Conference on IIH-MSP, Dalian, pp. 105–108, 2014.

A K Mandal, et.al “Performance Evaluation of Cryptographic Algorithms: DES and AES”, IEEE Students’ Conference on E and E,C S, pp. 1-5, 2012.

A. Yahya and A. Abdalla, “A shuffle image-encryption algorithm, “Journal of Computer Science, pp. 999–1002, 2008.

Mayank, et.al “A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping “International Journal of Information & Computation Technology. Vol. 4, pp. 741-746, 2014.

Zhang Yun, et.al “Digital image encryption algorithm based on chaos and improved DES”, IEEE Conference on Systems, Man and Cybernetics, 2009.

Sesha P Indrakanti and P.S.Avadhani, Permutation based Image Encryption Technique, International Journal of Computer Applications, Vol. 28, No. 8, 2011.

Mohammad Ali B Y and Aman J, “An Image Encryption Approach Using Combination of Permutation Technique Followed by Encryption”, International Journal of Computer Science and Network Security, Vol. 8, 2008.

Amitava Nag, et.al “Image Encryption Using Affine Transform and XOR Operation “, International Conference on ICSCCN 2011.


Refbacks

  • There are currently no refbacks.