CFP last date
20 May 2024
Reseach Article

Time Execution Constraints using Intricate Encryption and Decryption Process for Secure Data Transmission

by M. Laxmi Jeevani, Kuldeep Chouhan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 4
Year of Publication: 2015
Authors: M. Laxmi Jeevani, Kuldeep Chouhan
10.5120/19652-1261

M. Laxmi Jeevani, Kuldeep Chouhan . Time Execution Constraints using Intricate Encryption and Decryption Process for Secure Data Transmission. International Journal of Computer Applications. 112, 4 ( February 2015), 5-9. DOI=10.5120/19652-1261

@article{ 10.5120/19652-1261,
author = { M. Laxmi Jeevani, Kuldeep Chouhan },
title = { Time Execution Constraints using Intricate Encryption and Decryption Process for Secure Data Transmission },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 4 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 5-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number4/19652-1261/ },
doi = { 10.5120/19652-1261 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:48:32.087187+05:30
%A M. Laxmi Jeevani
%A Kuldeep Chouhan
%T Time Execution Constraints using Intricate Encryption and Decryption Process for Secure Data Transmission
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 4
%P 5-9
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The encryption and decryption process is widely investigated and developed for a robust data security which is challenging to crack. Many researchers proposed different types of encryption and decryption algorithms such as DES, AES, RSA, etc. , the proposed algorithms are encountered such as deficiency of stoutness and significant amount of time added to packet delay and to maintain the node data security in the network. The data security is the process which protects its privacy, integrity and availability. In this work, text data makes secure using encryption to decryption process while the secret key does not match and produce ambiguous message to the user during execution. The results demonstrate the efficiency of the encryption and decryption process in the measurement of time execution variations are presented.

References
  1. Vishwa Gupta, Gajendra Singh and Ravindra Gupta. 2012. Advance cryptography algorithm for improving data security. International Journal of Advanced Research in Computer Science and Software Engineering. Vol. 2, No. 1.
  2. Dripto Chatterjee, Joyshree Nath, Suvadeep Das Gupta and Asoke Nath. 2011. A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm. IEEE International Conference on Communication Systems and Network Technologies.
  3. Obaida Mohammad and Awad Al-Hazaimeh. 2013. A new approach for complex encrypting and decrypting data. International Journal of Computer Networks and Communications. Vol. 5, No. 2.
  4. Mohan, H. and Raji, R. 2011. Performance Analysis of AES and MARS Encryption Algorithms. International Journal of Computer Science Issues. Vol. 8, No. 4.
  5. Obaida Al-Hazaimeh. 2012. Increase the Security Level for Real-Time Application Using New Key Management Solution. International Journal of Computer Science Issues. Vol. 9, No. 3.
  6. Kocarev, L. and La Jolla. 2001. Chaos-based cryptography: a brief overview. IEEE Circuits and Systems Magazine. Vol. 1, No. 3, pp. 6-21.
  7. Shih-I. Huang, E. Shiuhpyng Shieh, E. J. D. Tygar. 2010. Secure encrypted-data aggregation for Wireless Sensor Networks. In Wireless Networks. Vol. 16, No. 4, pp. 915-927.
  8. Li, T. , Wu, Y. and Zhu, H. 2006. An efficient scheme for encrypted data aggregation on sensor networks. In proceedings of Vehicular Technology Conference, pp. 831–835.
  9. Uma, G. and Sriram, G. 2014. "Robust encryption algorithm based SHT in Wireless Sensor Networks", International Journal of Distributed and Parallel Systems. Vol. 5, No. 1/2/3.
  10. N. Li, N. Zhang, S. Das and B. Thuraisingham. 2009. Privacy Preservation in Wireless Sensor Networks (WSN): A State-of-the-Art Survey. Elsevier Journal Ad-Hoc Networks. Vol. 7, No. 8, pp. 1501-1514.
  11. Madhumita Panda. 2014. Security in Wireless Sensor Networks using Cryptographic Techniques. American Journal of Engineering Research. Vol. 3, No. 1, pp. 50-56.
  12. Yu Zhang. 2012. The Scheme of Public Key Infrastructure for Improving Wireless Sensor Networks Security. IEEE Conference, pp. 626-629.
  13. Gurjot Singh and Sandeep Kaur Dhanda. 2014. Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes. International Journal of Information Technology and Computer Science. Vol. 8, pp. 32-42.
  14. Bhavin, N. Patel and Neha Pandya. 2013. Secure Data Transfer using Cryptography with Virtual Energy for Wireless Sensor Network. International Journal of Engineering Trends and Technology. Vol. 4, No. 8, pp. 3468-3473.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Network Security Data Encryption and Data Decryption Technique Time Execution.