Routing Methodology for Secure Transmission of data in Physical Layer

  • Vandana* S
  • et al.
N/ACitations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The difficulties of privacy and security in WANETs have taken on a step by step more vital responsibility as those networks persist to increase their role globally. Historically, physical layer is regarded as biased function addressed below the security, and all broadly used cryptographic protocols like Rivest-Shamir–adlemen, Advanced encryption standard and Data Encryption standard are developed and applied assuming an error-free physical layer already exists . Contrasting the traditional cryptography hwhich neglects distinction among the communication channels, the current physical layer safety accomplish data protection using well designing channel code consistent with the channel capacities assuming that the authentic data can never be recovered. The standard system protection makes use of encryption and deciphering activities inside the application layer. Under any circumstances, this won't just construct the computational overhead of system. There's no actual way to avoid eavesdropper listening in and assault from the physical layer. Addressing this problem, this paper proposes a basic system model in which the cooperative relay broadcast channel with the user cooperation is introduced and the overall performance metrics based on the physical layer safety can viably enhance the system protection limit.

Cite

CITATION STYLE

APA

Vandana*, S., & Madhavi, T. (2019). Routing Methodology for Secure Transmission of data in Physical Layer. International Journal of Innovative Technology and Exploring Engineering, 9(2), 3144–3148. https://doi.org/10.35940/ijitee.a5100.129219

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free