IRO Journals

Journal of Trends in Computer Science and Smart Technology

A Review on Microstrip Patch Antenna Performance Improvement Techniques on Various Applications
Volume-3 | Issue-3

A Review on Finding Efficient Approach to Detect Customer Emotion Analysis using Deep Learning Analysis
Volume-3 | Issue-2

A Comparative Analysis of Prediction of Student Results Using Decision Trees and Random Forest
Volume-4 | Issue-3

Study of Security Mechanisms to Create a Secure Cloud in a Virtual Environment with the Support of Cloud Service Providers
Volume-2 | Issue-3

Construction of Black Box to Detect the Location of Road Mishap in Remote Area in the IoT Domain
Volume-3 | Issue-2

Fault Diagnosis in Hybrid Renewable Energy Sources with Machine Learning Approach
Volume-3 | Issue-3

Secure and Optimized Cloud-Based Cyber-Physical Systems with Memory-Aware Scheduling Scheme
Volume-2 | Issue-3

Stochastic Geometry and Performance Analysis of Large Scale Wireless Networks
Volume-3 | Issue-3

Computer Vision on IOT Based Patient Preference Management System
Volume-2 | Issue-2

Fake News Detection using Data Mining Techniques
Volume-3 | Issue-4

A Review on Microstrip Patch Antenna Performance Improvement Techniques on Various Applications
Volume-3 | Issue-3

Fake News Detection using Data Mining Techniques
Volume-3 | Issue-4

A Comparative Analysis of Prediction of Student Results Using Decision Trees and Random Forest
Volume-4 | Issue-3

Speedy Detection Module for Abandoned Belongings in Airport Using Improved Image Processing Technique
Volume-3 | Issue-4

Deployment of Artificial Intelligence with Bootstrapped Meta-Learning in Cyber Security
Volume-4 | Issue-3

Design an Early Detection and Classification for Diabetic Retinopathy by Deep Feature Extraction based Convolution Neural Network
Volume-3 | Issue-2

Design of an Intelligent Approach on Capsule Networks to Detect Forged Images
Volume-3 | Issue-3

Future Challenges of the Internet of Things in the Health Care Domain - An Overview
Volume-3 | Issue-4

Construction of Black Box to Detect the Location of Road Mishap in Remote Area in the IoT Domain
Volume-3 | Issue-2

A Review on Finding Efficient Approach to Detect Customer Emotion Analysis using Deep Learning Analysis
Volume-3 | Issue-2

Home / Archives / Volume-2 / Issue-2 / Article-4

Volume - 2 | Issue - 2 | june 2020

Novel Shared Key Transfer Protocol for Secure Data Transmission in Distributed Wireless Networks
Pages: 98-108
Published
26 May, 2020
Abstract

Handling Keys in the distributed wireless network is one of the most popular options that ensures the protection of data that are transmitted under various circumstances. It even assists the setting up, reversal and the looking after of keys across diverse. So this makes it requisite to process and produce a corporate key that is secret and as well as distribute it across the network that is decentralized. This sort of key is termed as the shared key. The shared key aids in the procedures of encrypting and decrypting the information's that are to be transmitted. Multitudes of applications are developed based on the decentralized wireless network such as wireless adhoc network, mobile adhoc networks, wireless sensor networks etc. are suggested with the secret key protection to enhance the security level while transmitting data. The shared key transfer protocol (SKTP) procedure accomplishes encryption /decryption for the message to be transferred it uses a group of key and shares them across a several transmissions that takes place across the head of the cluster and the nodes in the clustered paradigm. This shared collection of keys allows the consumer to encode and decode the message that is to be conveyed for all the consumers in a group enabling a member in the cluster to work together with the other member in the group around the data discovery. So the paper aims in establishing a novel shared key transfer protocol (N-SKTP) that is dynamic in nature and practically possible to secure the information transfer across the devices in the distributed wireless network. The N-SKTP utilizes the pubic key cryptography to develop a shared key group (SKG) for the manifold transmission in the network. The investigation of the performance of the proposed protocol using the network simulator -2 experimentally demonstrates the proficiency of the N-SKTP in the distributed wireless networks with limited resources.

Keywords

Distributed Wireless Networks Secret Keys N-SKTP SKG Encryption Decryption

Full Article PDF Download Article PDF 
×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
For single article (Indian)
1,200 INR
Article Access Charge
For single article (non-Indian)
15 USD
Open Access Fee (Indian) 5,000 INR
Open Access Fee (non-Indian) 80 USD
Annual Subscription Fee
For 1 Journal (Indian)
15,000 INR
Annual Subscription Fee
For 1 Journal (non-Indian)
200 USD
secure PAY INR / USD
Subscription form: click here