Routine of Encryption in Cognitive Radio Network

Today data transmission is very important through different channels. Need of network security comes to secure data transformation from one network to another network. As the complexity of the systems and the networks increases, weakness expands and the task of securing the networks is becomes more...

Full description

Bibliographic Details
Main Authors: Asif Raza, Muhammad Tanveer Meeran, Muizzud -din
Format: Article
Language:English
Published: Mehran University of Engineering and Technology 2019-07-01
Series:Mehran University Research Journal of Engineering and Technology
Online Access:http://publications.muet.edu.pk/index.php/muetrj/article/view/1131
id doaj-ec587647a8ac4414a96d197c27f573c9
record_format Article
spelling doaj-ec587647a8ac4414a96d197c27f573c92020-11-25T00:20:50ZengMehran University of Engineering and TechnologyMehran University Research Journal of Engineering and Technology0254-78212413-72192019-07-013836096181131Routine of Encryption in Cognitive Radio NetworkAsif Raza0Muhammad Tanveer Meeran1Muizzud -din2Department of Computer Science, Bahauddin Zakariya University, Multan, Pakistan.Department of Computer Science, Bahauddin Zakariya University, Multan, PakistanDepartment of Computer Science, Khawaja Fareed University, Rahim Yar Khan, Pakistan.Today data transmission is very important through different channels. Need of network security comes to secure data transformation from one network to another network. As the complexity of the systems and the networks increases, weakness expands and the task of securing the networks is becomes more convoluted. Duty of securing is done by Cryptography techniques. A colossal amount of data is exchanged over public networks like the internet due to immense accommodation. This includes personal details and confidential information. It is important to prevent the data from falling into the wrong hands. So, due to this factor we use cryptography. Encryption and decryption are the basic terms that are used in cryptography. There are few algorithms which used including, AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES (Triple Data Encryption Standard) and BLOWFISH. The main contribution of this paper is to provide an algorithm that is useful for data transformation in cognitive radio networks. In this research, we have drawn a new symmetric key technique that is for the usage of cryptography which is helpful to make the data saved from others.http://publications.muet.edu.pk/index.php/muetrj/article/view/1131
collection DOAJ
language English
format Article
sources DOAJ
author Asif Raza
Muhammad Tanveer Meeran
Muizzud -din
spellingShingle Asif Raza
Muhammad Tanveer Meeran
Muizzud -din
Routine of Encryption in Cognitive Radio Network
Mehran University Research Journal of Engineering and Technology
author_facet Asif Raza
Muhammad Tanveer Meeran
Muizzud -din
author_sort Asif Raza
title Routine of Encryption in Cognitive Radio Network
title_short Routine of Encryption in Cognitive Radio Network
title_full Routine of Encryption in Cognitive Radio Network
title_fullStr Routine of Encryption in Cognitive Radio Network
title_full_unstemmed Routine of Encryption in Cognitive Radio Network
title_sort routine of encryption in cognitive radio network
publisher Mehran University of Engineering and Technology
series Mehran University Research Journal of Engineering and Technology
issn 0254-7821
2413-7219
publishDate 2019-07-01
description Today data transmission is very important through different channels. Need of network security comes to secure data transformation from one network to another network. As the complexity of the systems and the networks increases, weakness expands and the task of securing the networks is becomes more convoluted. Duty of securing is done by Cryptography techniques. A colossal amount of data is exchanged over public networks like the internet due to immense accommodation. This includes personal details and confidential information. It is important to prevent the data from falling into the wrong hands. So, due to this factor we use cryptography. Encryption and decryption are the basic terms that are used in cryptography. There are few algorithms which used including, AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES (Triple Data Encryption Standard) and BLOWFISH. The main contribution of this paper is to provide an algorithm that is useful for data transformation in cognitive radio networks. In this research, we have drawn a new symmetric key technique that is for the usage of cryptography which is helpful to make the data saved from others.
url http://publications.muet.edu.pk/index.php/muetrj/article/view/1131
work_keys_str_mv AT asifraza routineofencryptionincognitiveradionetwork
AT muhammadtanveermeeran routineofencryptionincognitiveradionetwork
AT muizzuddin routineofencryptionincognitiveradionetwork
_version_ 1725365471800197120