SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
DOI : 10.14810/ecij.2015.4102 13
KEY GENERATION FRAMEWORK FOR MULTIPLE
WIRELESS DEVICES USING MULTIPATH ROUTING
Vijayaganesh M , Fungkha Narzary, and Rajanand S
Veltech Hightech Chennai-62, India,
ABSTRACT
The secret key generation for wireless devices, use for observing with every devices such as signal strength
and range of their distance achieved by lower bit matching via RSS. In previous system they are defined
secret key for multiple devices from one centralised device. Signal strength will be varied for each devices
and connection of that devices also will be lose when the devices goes out of the range. In recent years
network security become important issue. Data can be shared with other devices using secret key. We have
designed and implement multiple key generation for multiple devices. Each time generated a new secret key
for making communication with other devices. Overcome the range of signal strength and centralised
networks, able to communicate with any devices with help of AES. Expand the key strength and create a
different secret key upto 256 bit.
KEYWORDS
Secret key generation, group communication, expending key strength
1 .INTRODUCTION
Observe the outputs of distinct albeit correlated sources, could devise a secret key by means of
public communication. In other words, these terminals are able to generate common randomness
regarding which an eavesdropper, with access to this communication and perhaps also to side
information comprising the outputs of other sources which are correlate with the previous
sources, can glean only negligibly small amount of mutual information.
Today world come up with mobile environment. Use the mobile for communication, distance
identify and gather the information. We are present security during accessing the data via wireless
devices. Hearing of terms such as telecommuting enables anyone to work from home, at the same
time accessing resources also. The importance of computers, laptop, and smart phones, has in turn
made wireless devices. The portability of the devices are enable user to access all services as if
they were in the internal network of their company. For example, the use of tablets pc and I pads.
This new technology enables users to modify documents, use of internet, accessing e-mail,
download files, take photographs and also support video and voice conferencing.
Secret key generate secure communication between two communication devices and given
security to data’s. Now multiple technologies are came with help of secret key concept. Most of
research depends on the received signal, including that theoretical analysis. Other than the recent
work that was performed in home based devices., there is very little research on evaluating how
effective RSS based work extraction is in real environments under real settings. Proposed scheme
address this important limitation of the existing research in this paper with the help of wide scale
real life measurements in both static and dynamic environments.
Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
14
Secure wireless communications is a challenging problem due to the share data between devices.
Most existing security protocols apply encryption and decryption techniques for bit scrambling at
the application layer by exploiting a shared secret key between pairs of communicating nodes.
Secure keys are distinct for distinct pair wise links with a probability that the two users sharing a
common link generate the same key [5].Security techniques that exploit the randomness of
wireless channels for getting the secret key by performing encryption and decryption. Focus on
pair wise key generation, its highly scalable and improve the key bit generation rate by a couple
of orders [6].
In pair-wise independent network, every pair of terminals observes a common pair-wise source
that is independent of all sources accessible to the other pairs[15]. Here three specific problems
are investigated. One was each terminals are in observations with the others. All these terminals
wish to generate a common secret key. Two was designated terminals wish to generate a secret
key with the help of other terminals. Three was all the terminals wish to generate a common
secret key.
The communicating parties require some shared secret key with which to encrypt the message so
that it cannot be understood by an enemy observer. The exchange of some information between
the parties is necessary to achieve the bounds and various information [24]. Two cars to extract a
secret key from RSSI values in such a way that nearby cars cannot obtain the same secret[30].
The main contribution of this work is to group of the physical channel characteristics with key
generation algorithms to secure wireless networks.
2 .RELATED WORK
In previous research are shared the secret keys to de vices and compare their lower bit mapping
[13], they are using pin model. In a typical multipath environment, the wireless channel between
each pair of terminal produces a random mapping between the transmitted and received signals
which is time-varying and location specific.
The novel methodologies which allow robust secret key extraction from radio channel
measurements which user from real world non-reciprocities a prior unknown fading. The fading
signal are verified with their neighbour devices.The secret key generation utilizing physical layer
information of the radio channel it allows any two wireless devices within transmission range of
each other to extract a share symmetric cryptographic key while does not require a fixed data
range and destination range among the devices [1]. Based on the principle of two wireless devices
can interact with secret bits independently by using the sampled sequence from the radio channel
between them within the coherence time of the channel. Unlike existing key generation
algorithms, such as Diffie-Hellman, which deals the secret key generation between pair of
devices. It’s provided by the temporal and spatial variation of the radio channel can achieve
information theoretical secrecy [4]. We place our work in the context of relate research in section
II. We provide a feasibility study of using fine-grained channel response information for secret
key extraction and present the attack model in section III. We present the proposed channel gain
complement assisted key generation and extraction in section IV. Comparison and simulation
results based on performance of secret key using AES as given in section V.
3 . ARCHITECTURE
From the architecture diagram its shows multiple devices with unique secret key generation.
There many devices are need to access the data. It require secret key to access data so they send
request to key generator. Key generators observe the devices based on the RSS signal and encrypt
Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
15
the keys send to device which is sent the request. Devices are get the unique keys after decrypt
the key which are send by key generator by using AES algorithm, Key length 128bit so it’s little
faster than previous system. Allows the devices to access the data by extract the secret keys via
communication channel.
Figure1. Architecture Diagram
4. METHODOLOGY
The challenges arising from utilizing RSS measurements for group key generation. First, the RSS
values obtain between a pair of devices cannot be securely passed to other devices making it hard
to reach key agreement among multiple devices without the availability of a particular range.
Second, due to the multiple of mobile devices, the devices within the group that need to establish
a secret key may not be within each other’s communication range, making the existing RSS-
based methods not applicable. To address these challenges, we define AES algorithm. Our
frameworks consist of random number generation and key authentication..
Algorithm:
For i=1 to n do
K i=Ki-1+Ri
Where |Pi|=128
Xi=Pi+Ci
T=HASH(X1||X2||………Xn)
Where C=C1||C2||……..Cn
Let’s say Pi denotes the plaintext block, where 1<i<n, and n is total no of blocks.
Key Expansion (byte key[16],word w[44])
Step 1:For i=0 to 4 do
Step 2:W[i]= key[4*i],key[4*i+1],key[4*i+2],
key[4*i+3]
Decryp
tion
Decry
ption
Device1 Device2 Device n
Key
genera
tor
Observe the
devices
Encryption of keys
Decry
ption
Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
Step 3:For i=4 to 44 do
Step 4:T=w[i-1]
Step 5:If i|4 =0
Step6:T=subword * rotword (T)+rcon[i/4]
Step 7:W[i]-w[i-4]=T;
The key is divided by four parts of encryption and decryption then expanded key W[i] depends
on the immediate preceeding word, w[i
Rotword-is a one byte word. This was transformed the input word.
Subword-submit the input word
We now turn to a discussion of each of the four transformations used in AES. For each stage, we
mention the forward (encryption) algorithm, the inverse (decryption) algorithm, and the rational
for the design of that stage. Design of that secret key betwe
compared and mapped each other. A device can communicate with any other devices which are
connected in the network.
Figure2. Comparison of devices and its range due to transfer the data
Compare the devices and their data transfer
different various speed. If data sizes
Numbers of devices are no problem.
Figure3. Comparison existing and proposed
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
0-25
devices
0
100
percent
age
Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
Step6:T=subword * rotword (T)+rcon[i/4]
The key is divided by four parts of encryption and decryption then expanded key W[i] depends
on the immediate preceeding word, w[i-1] and the word four positions back w[i-4].
a one byte word. This was transformed the input word.
We now turn to a discussion of each of the four transformations used in AES. For each stage, we
mention the forward (encryption) algorithm, the inverse (decryption) algorithm, and the rational
for the design of that stage. Design of that secret key between inputs bits and output bits, bits rate
compared and mapped each other. A device can communicate with any other devices which are
Figure2. Comparison of devices and its range due to transfer the data
their data transferring rate, comparison of four devices it allows
t various speed. If data sizes are increases than speed of devices will become low.
no problem.
Figure3. Comparison existing and proposed
26-50 51-75 76-100
AES DES
range of files tranfer
0
100
proposed existing
functionality
Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
16
The key is divided by four parts of encryption and decryption then expanded key W[i] depends
We now turn to a discussion of each of the four transformations used in AES. For each stage, we
mention the forward (encryption) algorithm, the inverse (decryption) algorithm, and the rational
en inputs bits and output bits, bits rate
compared and mapped each other. A device can communicate with any other devices which are
comparison of four devices it allows
are increases than speed of devices will become low.
100
DES
Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
17
Compare the secret key generation its efficient than other previous research because its generate
128 bit key. Flexibility to changes of keys. Different unique key provide each time so security
will be efficient. communication speed depends on file size
Figure4. Usage percentage of secret keys
5 .PERFORMANCE ANALYSIS
Compare the secret key generation and its usage performance between DES and AES. DES was
older one compare with AES. Due to performing the encryption and decryption DES takes 16
rounds, but AES takes 10 rounds only. So AES generate secret key as faster and efficient.
Factors AES DES
Developed 2000 1977
Key size 128 to 256 bits 56 bits
Block size 128 bits 64bits
Cipher & decipher Use same key Use same key
Encryption Faster Moderate
Decryption Faster Moderate
Security Excellent secured Not secure enough
Rounds 10 16
Table1.comparison of AES and DES
Based upon the secret key generation AES can generate key as fastly and length of key also
bigger than DES. AES key length start from 128bits up to 256bits and it divides the block size as
128bits. AES one of the symmetric key cryptographic algorithm so uses the same key for both
encryption and decryption. Compare the security level also AES gives excellent security to data
via its secret key. Key length is higher so every time generate distinct key easily. AES can able to
generates millions of unique secret keys. Due to generation of key it takes 10 rounds then reduce
the time and increase the key length.
0
10
20
30
40
50
60
70
80
90
100
2009 2010 2011 2012 2013
secret key usage
percentage
ofuser
years
Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
18
Figure5. Comparison of time taken
A number of files in different sizes were showed into the simulation test. From the comparative
study all possible factors can possible to print secret keys as fast and secure.
Comparing the security level our secret key generation is very secure than existing. The key
length taken up to 256 bits. so it can generate the millions of different keys, key length was
another one important advantage here not easy to judge the key . This can provide the more
security to data and increase the hardware and software performances.
6.CONCLUSION
Secret key designed and group secret key generation for multiple wireless devices. The scheme
take an advantages of provides different key for each action performance. We given the solution
for access the data from anywhere it’s no need range of wireless device. Key length has been
expanded A result from implementation of secret key is faster than DES with help of using AES
algorithm.
REFERENCES
[1] B. Azimi sadjadi, A. Kiayias, A. Mercado, and B.Yener, “Robust key generation from signal
envelopes in wireless networks“ , in ACM CCS, pp. 401-410(2007).
[2] A. sayeed and A. Perrig, “secure wireless communications: Secret keys through multipath”, in IEEE
ICASSP,pp.3013-3016.0(2008).
[3] Q. Wang, H. Su, K. Ren and K. Kim, “Fast and scalable secret key generation exploiting channel
phase randomness in wireless networks”, in IEEE INFOCOM, (2011).
[4] N.Patwari, J. Croft, S. Jana and S. Kasera, “High rate uncorrelated bit extraction for shared secret
key generation from channel measurements”, IEEE Transactions on mobile computing, pp, 17-
30(2009).
[5] J.Croft, N. Patwari, and S. Kasera, “Robust uncorrelated bit extraction methodologies for wireless
sensors”, in ACM/IEEE ICNP, pp, 70-81(2010).
[6] Y. Kim, A. Perrig and G.Tsudik, “Tree- based group key agreement”, TISSEC(2004).
[7] S. Nitinawarat, C. Ye, A. Barg, P. Narayan, and A. Reznik, “Secret key generation for a pair wise
independent network model, “IEEE TIFS, vol.2, no.3, pp. 364-375(2007).
[8] S.Nitinawarat and P. Narayanan, “Perfect omniscience, perfect secrecy, and steiner tree packing,”
IEEE Transactions on information Theory(2010).
[9] C. Ye and A. Reznik, “Group secret key generation algorithms,” in IEEE ISIT(2007).
0
10
20
30
40
50
60
70
80
90
0.5Mb 1Mb 1.5Mb 2Mb
DES AES
timeinseconds
file size
Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
19
[10] R. Wilson, D. Tse, and R. Scholtz, “Channel identification” Secret sharing using reciprocity in
ultrawideband channels,” IEEE TIFS, vol.2, no.3, pp.364-375(2007).
[11] Z. Li, W. Xu, R. Miller and W. Trappe, “Securing wireless systems via lower layer enforcements,”
in Proceeings of the 5th ACM workshop on Wireless security, pp.33-42(2006).
[12] I. Csiszar and R. Ahlswede, “secrecy capacities for multiple terminals,”IEEE Transactions on
Information Theory , vol. 50,pp. 3046-3061, (2004).
[13] H. Liu, J. Yang, and Y.Chen, “Collaborative secret key extraction leveraging received signal
strength in mobile wireless networks, “ in IEEE INFOCOM, pp. 927-935(2012).
[14] O. Arazi and H.Qi,”Self-certified group key generation for ad hoc clusters in wireless networks,” in
IEEE INFOCOM(2005).
[15] U. Maurer and S. Wolf,”Secret key agreement over a non authenticate chanel part iii,”IEEE
Transactions on Information Theory, vol.49,pp.822-851(2003).

Contenu connexe

Tendances

Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoTIJCERT
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)rosu555
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
 
BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...
BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...
BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...Gerard Fuguet
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.igede tirtanata
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Templateijircee
 
A Comprehensive Approach to Secure Group Communication in Wireless Networks
A Comprehensive Approach to Secure Group Communication in Wireless NetworksA Comprehensive Approach to Secure Group Communication in Wireless Networks
A Comprehensive Approach to Secure Group Communication in Wireless NetworksDavid González Romero
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Dr. Amarjeet Singh
 
Virtual private network a veritable tool for network security
Virtual private network a veritable tool for network securityVirtual private network a veritable tool for network security
Virtual private network a veritable tool for network securityeSAT Publishing House
 
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...TELKOMNIKA JOURNAL
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationA secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationSahil Bajaj
 
COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3Soon Zoo Kwon
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET Journal
 

Tendances (20)

Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
woot15-paper-novella
woot15-paper-novellawoot15-paper-novella
woot15-paper-novella
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data Communication
 
BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...
BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...
BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
A Comprehensive Approach to Secure Group Communication in Wireless Networks
A Comprehensive Approach to Secure Group Communication in Wireless NetworksA Comprehensive Approach to Secure Group Communication in Wireless Networks
A Comprehensive Approach to Secure Group Communication in Wireless Networks
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
 
Y36146148
Y36146148Y36146148
Y36146148
 
Virtual private network a veritable tool for network security
Virtual private network a veritable tool for network securityVirtual private network a veritable tool for network security
Virtual private network a veritable tool for network security
 
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationA secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
 

Similaire à Multi-Device Secret Key Generation using AES

SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.pptAliSalman110
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Editor IJARCET
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSHASHANK WANKHADE
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKijmnct
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406pradip patel
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406pradip patel
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
 

Similaire à Multi-Device Secret Key Generation using AES (20)

SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
 
Cyber security
Cyber securityCyber security
Cyber security
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
 

Plus de ecij

NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...
NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...
NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...ecij
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)ecij
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)ecij
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)ecij
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)ecij
 
ADOPTING MEASURES TO REDUCE POWER OUTAGES
ADOPTING MEASURES TO REDUCE POWER OUTAGESADOPTING MEASURES TO REDUCE POWER OUTAGES
ADOPTING MEASURES TO REDUCE POWER OUTAGESecij
 
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...ecij
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)ecij
 
PREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGEL
PREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGELPREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGEL
PREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGELecij
 
4th International Conference on Electrical Engineering (ELEC 2020)
4th International Conference on Electrical Engineering (ELEC 2020)4th International Conference on Electrical Engineering (ELEC 2020)
4th International Conference on Electrical Engineering (ELEC 2020)ecij
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)ecij
 
4th International Conference on Bioscience & Engineering (BIEN 2020)
4th International Conference on Bioscience & Engineering (BIEN 2020) 4th International Conference on Bioscience & Engineering (BIEN 2020)
4th International Conference on Bioscience & Engineering (BIEN 2020) ecij
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)ecij
 
Ecij cfp
Ecij cfpEcij cfp
Ecij cfpecij
 
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...ecij
 
UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...
UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...
UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...ecij
 
USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT
USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT
USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT ecij
 
MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...
MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...
MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...ecij
 
Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...
Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...
Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...ecij
 
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMSA COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMSecij
 

Plus de ecij (20)

NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...
NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...
NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
 
ADOPTING MEASURES TO REDUCE POWER OUTAGES
ADOPTING MEASURES TO REDUCE POWER OUTAGESADOPTING MEASURES TO REDUCE POWER OUTAGES
ADOPTING MEASURES TO REDUCE POWER OUTAGES
 
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
 
PREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGEL
PREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGELPREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGEL
PREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGEL
 
4th International Conference on Electrical Engineering (ELEC 2020)
4th International Conference on Electrical Engineering (ELEC 2020)4th International Conference on Electrical Engineering (ELEC 2020)
4th International Conference on Electrical Engineering (ELEC 2020)
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
 
4th International Conference on Bioscience & Engineering (BIEN 2020)
4th International Conference on Bioscience & Engineering (BIEN 2020) 4th International Conference on Bioscience & Engineering (BIEN 2020)
4th International Conference on Bioscience & Engineering (BIEN 2020)
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
 
Ecij cfp
Ecij cfpEcij cfp
Ecij cfp
 
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
 
UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...
UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...
UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...
 
USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT
USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT
USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT
 
MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...
MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...
MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...
 
Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...
Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...
Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...
 
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMSA COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
 

Dernier

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 

Dernier (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 

Multi-Device Secret Key Generation using AES

  • 1. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 DOI : 10.14810/ecij.2015.4102 13 KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTING Vijayaganesh M , Fungkha Narzary, and Rajanand S Veltech Hightech Chennai-62, India, ABSTRACT The secret key generation for wireless devices, use for observing with every devices such as signal strength and range of their distance achieved by lower bit matching via RSS. In previous system they are defined secret key for multiple devices from one centralised device. Signal strength will be varied for each devices and connection of that devices also will be lose when the devices goes out of the range. In recent years network security become important issue. Data can be shared with other devices using secret key. We have designed and implement multiple key generation for multiple devices. Each time generated a new secret key for making communication with other devices. Overcome the range of signal strength and centralised networks, able to communicate with any devices with help of AES. Expand the key strength and create a different secret key upto 256 bit. KEYWORDS Secret key generation, group communication, expending key strength 1 .INTRODUCTION Observe the outputs of distinct albeit correlated sources, could devise a secret key by means of public communication. In other words, these terminals are able to generate common randomness regarding which an eavesdropper, with access to this communication and perhaps also to side information comprising the outputs of other sources which are correlate with the previous sources, can glean only negligibly small amount of mutual information. Today world come up with mobile environment. Use the mobile for communication, distance identify and gather the information. We are present security during accessing the data via wireless devices. Hearing of terms such as telecommuting enables anyone to work from home, at the same time accessing resources also. The importance of computers, laptop, and smart phones, has in turn made wireless devices. The portability of the devices are enable user to access all services as if they were in the internal network of their company. For example, the use of tablets pc and I pads. This new technology enables users to modify documents, use of internet, accessing e-mail, download files, take photographs and also support video and voice conferencing. Secret key generate secure communication between two communication devices and given security to data’s. Now multiple technologies are came with help of secret key concept. Most of research depends on the received signal, including that theoretical analysis. Other than the recent work that was performed in home based devices., there is very little research on evaluating how effective RSS based work extraction is in real environments under real settings. Proposed scheme address this important limitation of the existing research in this paper with the help of wide scale real life measurements in both static and dynamic environments.
  • 2. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 14 Secure wireless communications is a challenging problem due to the share data between devices. Most existing security protocols apply encryption and decryption techniques for bit scrambling at the application layer by exploiting a shared secret key between pairs of communicating nodes. Secure keys are distinct for distinct pair wise links with a probability that the two users sharing a common link generate the same key [5].Security techniques that exploit the randomness of wireless channels for getting the secret key by performing encryption and decryption. Focus on pair wise key generation, its highly scalable and improve the key bit generation rate by a couple of orders [6]. In pair-wise independent network, every pair of terminals observes a common pair-wise source that is independent of all sources accessible to the other pairs[15]. Here three specific problems are investigated. One was each terminals are in observations with the others. All these terminals wish to generate a common secret key. Two was designated terminals wish to generate a secret key with the help of other terminals. Three was all the terminals wish to generate a common secret key. The communicating parties require some shared secret key with which to encrypt the message so that it cannot be understood by an enemy observer. The exchange of some information between the parties is necessary to achieve the bounds and various information [24]. Two cars to extract a secret key from RSSI values in such a way that nearby cars cannot obtain the same secret[30]. The main contribution of this work is to group of the physical channel characteristics with key generation algorithms to secure wireless networks. 2 .RELATED WORK In previous research are shared the secret keys to de vices and compare their lower bit mapping [13], they are using pin model. In a typical multipath environment, the wireless channel between each pair of terminal produces a random mapping between the transmitted and received signals which is time-varying and location specific. The novel methodologies which allow robust secret key extraction from radio channel measurements which user from real world non-reciprocities a prior unknown fading. The fading signal are verified with their neighbour devices.The secret key generation utilizing physical layer information of the radio channel it allows any two wireless devices within transmission range of each other to extract a share symmetric cryptographic key while does not require a fixed data range and destination range among the devices [1]. Based on the principle of two wireless devices can interact with secret bits independently by using the sampled sequence from the radio channel between them within the coherence time of the channel. Unlike existing key generation algorithms, such as Diffie-Hellman, which deals the secret key generation between pair of devices. It’s provided by the temporal and spatial variation of the radio channel can achieve information theoretical secrecy [4]. We place our work in the context of relate research in section II. We provide a feasibility study of using fine-grained channel response information for secret key extraction and present the attack model in section III. We present the proposed channel gain complement assisted key generation and extraction in section IV. Comparison and simulation results based on performance of secret key using AES as given in section V. 3 . ARCHITECTURE From the architecture diagram its shows multiple devices with unique secret key generation. There many devices are need to access the data. It require secret key to access data so they send request to key generator. Key generators observe the devices based on the RSS signal and encrypt
  • 3. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 15 the keys send to device which is sent the request. Devices are get the unique keys after decrypt the key which are send by key generator by using AES algorithm, Key length 128bit so it’s little faster than previous system. Allows the devices to access the data by extract the secret keys via communication channel. Figure1. Architecture Diagram 4. METHODOLOGY The challenges arising from utilizing RSS measurements for group key generation. First, the RSS values obtain between a pair of devices cannot be securely passed to other devices making it hard to reach key agreement among multiple devices without the availability of a particular range. Second, due to the multiple of mobile devices, the devices within the group that need to establish a secret key may not be within each other’s communication range, making the existing RSS- based methods not applicable. To address these challenges, we define AES algorithm. Our frameworks consist of random number generation and key authentication.. Algorithm: For i=1 to n do K i=Ki-1+Ri Where |Pi|=128 Xi=Pi+Ci T=HASH(X1||X2||………Xn) Where C=C1||C2||……..Cn Let’s say Pi denotes the plaintext block, where 1<i<n, and n is total no of blocks. Key Expansion (byte key[16],word w[44]) Step 1:For i=0 to 4 do Step 2:W[i]= key[4*i],key[4*i+1],key[4*i+2], key[4*i+3] Decryp tion Decry ption Device1 Device2 Device n Key genera tor Observe the devices Encryption of keys Decry ption
  • 4. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 Step 3:For i=4 to 44 do Step 4:T=w[i-1] Step 5:If i|4 =0 Step6:T=subword * rotword (T)+rcon[i/4] Step 7:W[i]-w[i-4]=T; The key is divided by four parts of encryption and decryption then expanded key W[i] depends on the immediate preceeding word, w[i Rotword-is a one byte word. This was transformed the input word. Subword-submit the input word We now turn to a discussion of each of the four transformations used in AES. For each stage, we mention the forward (encryption) algorithm, the inverse (decryption) algorithm, and the rational for the design of that stage. Design of that secret key betwe compared and mapped each other. A device can communicate with any other devices which are connected in the network. Figure2. Comparison of devices and its range due to transfer the data Compare the devices and their data transfer different various speed. If data sizes Numbers of devices are no problem. Figure3. Comparison existing and proposed 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 0-25 devices 0 100 percent age Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 Step6:T=subword * rotword (T)+rcon[i/4] The key is divided by four parts of encryption and decryption then expanded key W[i] depends on the immediate preceeding word, w[i-1] and the word four positions back w[i-4]. a one byte word. This was transformed the input word. We now turn to a discussion of each of the four transformations used in AES. For each stage, we mention the forward (encryption) algorithm, the inverse (decryption) algorithm, and the rational for the design of that stage. Design of that secret key between inputs bits and output bits, bits rate compared and mapped each other. A device can communicate with any other devices which are Figure2. Comparison of devices and its range due to transfer the data their data transferring rate, comparison of four devices it allows t various speed. If data sizes are increases than speed of devices will become low. no problem. Figure3. Comparison existing and proposed 26-50 51-75 76-100 AES DES range of files tranfer 0 100 proposed existing functionality Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 16 The key is divided by four parts of encryption and decryption then expanded key W[i] depends We now turn to a discussion of each of the four transformations used in AES. For each stage, we mention the forward (encryption) algorithm, the inverse (decryption) algorithm, and the rational en inputs bits and output bits, bits rate compared and mapped each other. A device can communicate with any other devices which are comparison of four devices it allows are increases than speed of devices will become low. 100 DES
  • 5. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 17 Compare the secret key generation its efficient than other previous research because its generate 128 bit key. Flexibility to changes of keys. Different unique key provide each time so security will be efficient. communication speed depends on file size Figure4. Usage percentage of secret keys 5 .PERFORMANCE ANALYSIS Compare the secret key generation and its usage performance between DES and AES. DES was older one compare with AES. Due to performing the encryption and decryption DES takes 16 rounds, but AES takes 10 rounds only. So AES generate secret key as faster and efficient. Factors AES DES Developed 2000 1977 Key size 128 to 256 bits 56 bits Block size 128 bits 64bits Cipher & decipher Use same key Use same key Encryption Faster Moderate Decryption Faster Moderate Security Excellent secured Not secure enough Rounds 10 16 Table1.comparison of AES and DES Based upon the secret key generation AES can generate key as fastly and length of key also bigger than DES. AES key length start from 128bits up to 256bits and it divides the block size as 128bits. AES one of the symmetric key cryptographic algorithm so uses the same key for both encryption and decryption. Compare the security level also AES gives excellent security to data via its secret key. Key length is higher so every time generate distinct key easily. AES can able to generates millions of unique secret keys. Due to generation of key it takes 10 rounds then reduce the time and increase the key length. 0 10 20 30 40 50 60 70 80 90 100 2009 2010 2011 2012 2013 secret key usage percentage ofuser years
  • 6. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 18 Figure5. Comparison of time taken A number of files in different sizes were showed into the simulation test. From the comparative study all possible factors can possible to print secret keys as fast and secure. Comparing the security level our secret key generation is very secure than existing. The key length taken up to 256 bits. so it can generate the millions of different keys, key length was another one important advantage here not easy to judge the key . This can provide the more security to data and increase the hardware and software performances. 6.CONCLUSION Secret key designed and group secret key generation for multiple wireless devices. The scheme take an advantages of provides different key for each action performance. We given the solution for access the data from anywhere it’s no need range of wireless device. Key length has been expanded A result from implementation of secret key is faster than DES with help of using AES algorithm. REFERENCES [1] B. Azimi sadjadi, A. Kiayias, A. Mercado, and B.Yener, “Robust key generation from signal envelopes in wireless networks“ , in ACM CCS, pp. 401-410(2007). [2] A. sayeed and A. Perrig, “secure wireless communications: Secret keys through multipath”, in IEEE ICASSP,pp.3013-3016.0(2008). [3] Q. Wang, H. Su, K. Ren and K. Kim, “Fast and scalable secret key generation exploiting channel phase randomness in wireless networks”, in IEEE INFOCOM, (2011). [4] N.Patwari, J. Croft, S. Jana and S. Kasera, “High rate uncorrelated bit extraction for shared secret key generation from channel measurements”, IEEE Transactions on mobile computing, pp, 17- 30(2009). [5] J.Croft, N. Patwari, and S. Kasera, “Robust uncorrelated bit extraction methodologies for wireless sensors”, in ACM/IEEE ICNP, pp, 70-81(2010). [6] Y. Kim, A. Perrig and G.Tsudik, “Tree- based group key agreement”, TISSEC(2004). [7] S. Nitinawarat, C. Ye, A. Barg, P. Narayan, and A. Reznik, “Secret key generation for a pair wise independent network model, “IEEE TIFS, vol.2, no.3, pp. 364-375(2007). [8] S.Nitinawarat and P. Narayanan, “Perfect omniscience, perfect secrecy, and steiner tree packing,” IEEE Transactions on information Theory(2010). [9] C. Ye and A. Reznik, “Group secret key generation algorithms,” in IEEE ISIT(2007). 0 10 20 30 40 50 60 70 80 90 0.5Mb 1Mb 1.5Mb 2Mb DES AES timeinseconds file size
  • 7. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 19 [10] R. Wilson, D. Tse, and R. Scholtz, “Channel identification” Secret sharing using reciprocity in ultrawideband channels,” IEEE TIFS, vol.2, no.3, pp.364-375(2007). [11] Z. Li, W. Xu, R. Miller and W. Trappe, “Securing wireless systems via lower layer enforcements,” in Proceeings of the 5th ACM workshop on Wireless security, pp.33-42(2006). [12] I. Csiszar and R. Ahlswede, “secrecy capacities for multiple terminals,”IEEE Transactions on Information Theory , vol. 50,pp. 3046-3061, (2004). [13] H. Liu, J. Yang, and Y.Chen, “Collaborative secret key extraction leveraging received signal strength in mobile wireless networks, “ in IEEE INFOCOM, pp. 927-935(2012). [14] O. Arazi and H.Qi,”Self-certified group key generation for ad hoc clusters in wireless networks,” in IEEE INFOCOM(2005). [15] U. Maurer and S. Wolf,”Secret key agreement over a non authenticate chanel part iii,”IEEE Transactions on Information Theory, vol.49,pp.822-851(2003).