Routine of Encryption in Cognitive Radio Network
Today data transmission is very important through different channels. Need of network security comes to secure data transformation from one network to another network. As the complexity of the systems and the networks increases, weakness expands and the task of securing the networks is becomes more...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Mehran University of Engineering and Technology
2019-07-01
|
Series: | Mehran University Research Journal of Engineering and Technology |
Online Access: | http://publications.muet.edu.pk/index.php/muetrj/article/view/1131 |
id |
doaj-ec587647a8ac4414a96d197c27f573c9 |
---|---|
record_format |
Article |
spelling |
doaj-ec587647a8ac4414a96d197c27f573c92020-11-25T00:20:50ZengMehran University of Engineering and TechnologyMehran University Research Journal of Engineering and Technology0254-78212413-72192019-07-013836096181131Routine of Encryption in Cognitive Radio NetworkAsif Raza0Muhammad Tanveer Meeran1Muizzud -din2Department of Computer Science, Bahauddin Zakariya University, Multan, Pakistan.Department of Computer Science, Bahauddin Zakariya University, Multan, PakistanDepartment of Computer Science, Khawaja Fareed University, Rahim Yar Khan, Pakistan.Today data transmission is very important through different channels. Need of network security comes to secure data transformation from one network to another network. As the complexity of the systems and the networks increases, weakness expands and the task of securing the networks is becomes more convoluted. Duty of securing is done by Cryptography techniques. A colossal amount of data is exchanged over public networks like the internet due to immense accommodation. This includes personal details and confidential information. It is important to prevent the data from falling into the wrong hands. So, due to this factor we use cryptography. Encryption and decryption are the basic terms that are used in cryptography. There are few algorithms which used including, AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES (Triple Data Encryption Standard) and BLOWFISH. The main contribution of this paper is to provide an algorithm that is useful for data transformation in cognitive radio networks. In this research, we have drawn a new symmetric key technique that is for the usage of cryptography which is helpful to make the data saved from others.http://publications.muet.edu.pk/index.php/muetrj/article/view/1131 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Asif Raza Muhammad Tanveer Meeran Muizzud -din |
spellingShingle |
Asif Raza Muhammad Tanveer Meeran Muizzud -din Routine of Encryption in Cognitive Radio Network Mehran University Research Journal of Engineering and Technology |
author_facet |
Asif Raza Muhammad Tanveer Meeran Muizzud -din |
author_sort |
Asif Raza |
title |
Routine of Encryption in Cognitive Radio Network |
title_short |
Routine of Encryption in Cognitive Radio Network |
title_full |
Routine of Encryption in Cognitive Radio Network |
title_fullStr |
Routine of Encryption in Cognitive Radio Network |
title_full_unstemmed |
Routine of Encryption in Cognitive Radio Network |
title_sort |
routine of encryption in cognitive radio network |
publisher |
Mehran University of Engineering and Technology |
series |
Mehran University Research Journal of Engineering and Technology |
issn |
0254-7821 2413-7219 |
publishDate |
2019-07-01 |
description |
Today data transmission is very important through different channels. Need of network security comes to secure data transformation from one network to another network. As the complexity of the systems and the networks increases, weakness expands and the task of securing the networks is becomes more convoluted. Duty of securing is done by Cryptography techniques. A colossal amount of data is exchanged over public networks like the internet due to immense accommodation. This includes personal details and confidential information. It is important to prevent the data from falling into the wrong hands. So, due to this factor we use cryptography. Encryption and decryption are the basic terms that are used in cryptography. There are few algorithms which used including, AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES (Triple Data Encryption Standard) and BLOWFISH. The main contribution of this paper is to provide an algorithm that is useful for data transformation in cognitive radio networks. In this research, we have drawn a new symmetric key technique that is for the usage of cryptography which is helpful to make the data saved from others. |
url |
http://publications.muet.edu.pk/index.php/muetrj/article/view/1131 |
work_keys_str_mv |
AT asifraza routineofencryptionincognitiveradionetwork AT muhammadtanveermeeran routineofencryptionincognitiveradionetwork AT muizzuddin routineofencryptionincognitiveradionetwork |
_version_ |
1725365471800197120 |