Research on Information Security Algorithm of Wireless Communication System

2012 ◽  
Vol 160 ◽  
pp. 297-300
Author(s):  
Cong Chen

The ubiquitous network and it provides the high quality wireless service, all depends on the wireless communication system network security level. Safety algorithm for wireless communication system constructed in different network reliability. In this paper, based on the wireless communication system to study on information security technology, as the development of information security provides a theoretical basis.

2021 ◽  
Vol 23 (06) ◽  
pp. 1148-1157
Author(s):  
Vikram Patalbansi ◽  
◽  
Dr. G. Prasanna Laxmi ◽  

The ubiquitous network like Mobile Cloud Computing (MCC) provides a high quality of wireless services depending upon the wireless communication system network security level. And so many researches are carried out by the researcher on security algorithms for wireless communication system constructed in different network reliability. In our proposed thesis paper, on a theoretical basis, we developed the theory of MCC Security Layer Protocol security system in which we used the cryptographic hash function SHA-256 to generate a private key for entities, RC5 encryption, and decryption algorithm, Temporal Key Integrity Protocol (TKIP) generating a dynamic sequential key and CRC-32 checksum to detecting the error in our packets. The MSLP uses the stored symmetric secret key calculated on the basis of the Diffie-Hellman Key sharing scheme to generate keystream for cryptography functions. The secret key stored in the device’s filesystem our database prior to the deployment on Mobile Cloud Computing and remains the same throughout the session of communication. These systems use the dynamic initialization vector to avoid reply attacks and message integrity code calculated on source and destination devices addresses and actual frame contents. In the proposed thesis paper we analyze the security measures at the MSLP level and before transmitting information over the mobile networks, the information is encrypted in the form of frames and at the physical layer, this frame converted into its equivalent radio signals.


Author(s):  
SHARMA POOJA ◽  
SHRIVASTAVA SHARAD MOHAN ◽  
MISHRA ANUJA ◽  
AGRAWAL PRACHI ◽  
PARGANIHA RAHUL ◽  
...  

2017 ◽  
Author(s):  
Li Jiang ◽  
Xiaoyang Zhang ◽  
Zhixiang Sun ◽  
Youcheng Tian ◽  
Juan Wang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document