A Review on Microstrip Patch Antenna Performance Improvement Techniques on Various Applications
Volume-3 | Issue-3
A Review on Finding Efficient Approach to Detect Customer Emotion Analysis using Deep Learning Analysis
Volume-3 | Issue-2
A Comparative Analysis of Prediction of Student Results Using Decision Trees and Random Forest
Volume-4 | Issue-3
Study of Security Mechanisms to Create a Secure Cloud in a Virtual Environment with the Support of Cloud Service Providers
Volume-2 | Issue-3
Construction of Black Box to Detect the Location of Road Mishap in Remote Area in the IoT Domain
Volume-3 | Issue-2
Fault Diagnosis in Hybrid Renewable Energy Sources with Machine Learning Approach
Volume-3 | Issue-3
Secure and Optimized Cloud-Based Cyber-Physical Systems with Memory-Aware Scheduling Scheme
Volume-2 | Issue-3
Stochastic Geometry and Performance Analysis of Large Scale Wireless Networks
Volume-3 | Issue-3
Computer Vision on IOT Based Patient Preference Management System
Volume-2 | Issue-2
Fake News Detection using Data Mining Techniques
Volume-3 | Issue-4
A Review on Microstrip Patch Antenna Performance Improvement Techniques on Various Applications
Volume-3 | Issue-3
Fake News Detection using Data Mining Techniques
Volume-3 | Issue-4
A Comparative Analysis of Prediction of Student Results Using Decision Trees and Random Forest
Volume-4 | Issue-3
Speedy Detection Module for Abandoned Belongings in Airport Using Improved Image Processing Technique
Volume-3 | Issue-4
Deployment of Artificial Intelligence with Bootstrapped Meta-Learning in Cyber Security
Volume-4 | Issue-3
Design an Early Detection and Classification for Diabetic Retinopathy by Deep Feature Extraction based Convolution Neural Network
Volume-3 | Issue-2
Design of an Intelligent Approach on Capsule Networks to Detect Forged Images
Volume-3 | Issue-3
Future Challenges of the Internet of Things in the Health Care Domain - An Overview
Volume-3 | Issue-4
Construction of Black Box to Detect the Location of Road Mishap in Remote Area in the IoT Domain
Volume-3 | Issue-2
A Review on Finding Efficient Approach to Detect Customer Emotion Analysis using Deep Learning Analysis
Volume-3 | Issue-2
Volume - 2 | Issue - 2 | june 2020
Published
26 May, 2020
Handling Keys in the distributed wireless network is one of the most popular options that ensures the protection of data that are transmitted under various circumstances. It even assists the setting up, reversal and the looking after of keys across diverse. So this makes it requisite to process and produce a corporate key that is secret and as well as distribute it across the network that is decentralized. This sort of key is termed as the shared key. The shared key aids in the procedures of encrypting and decrypting the information's that are to be transmitted. Multitudes of applications are developed based on the decentralized wireless network such as wireless adhoc network, mobile adhoc networks, wireless sensor networks etc. are suggested with the secret key protection to enhance the security level while transmitting data. The shared key transfer protocol (SKTP) procedure accomplishes encryption /decryption for the message to be transferred it uses a group of key and shares them across a several transmissions that takes place across the head of the cluster and the nodes in the clustered paradigm. This shared collection of keys allows the consumer to encode and decode the message that is to be conveyed for all the consumers in a group enabling a member in the cluster to work together with the other member in the group around the data discovery. So the paper aims in establishing a novel shared key transfer protocol (N-SKTP) that is dynamic in nature and practically possible to secure the information transfer across the devices in the distributed wireless network. The N-SKTP utilizes the pubic key cryptography to develop a shared key group (SKG) for the manifold transmission in the network. The investigation of the performance of the proposed protocol using the network simulator -2 experimentally demonstrates the proficiency of the N-SKTP in the distributed wireless networks with limited resources.
KeywordsDistributed Wireless Networks Secret Keys N-SKTP SKG Encryption Decryption
Full Article PDF Download Article PDF