Friday, 8 September 2017

Cryptographic techniques for mobile network

To transmit securely over an insecure channel is the most arduous task to be dealt with in today’s era of mobile communication. As mobile systems extend their data transmission, cell phones, as with some other Internet gadget, turn out to be generously presented to Internet security vulnerabilities. All the security threats that we are familiar with in the Internet, invade the cellular wireless networks as well, and translate into risks for commercial transactions, corporate data and personal information. Secured communication in ad hoc wireless networks is primarily important, because the communication signals are more vulnerable as they propagate through air and are more susceptible to attacks ranging from passive eavesdropping to active interfering. The lack of any central coordination and shared wireless medium makes them more vulnerable to attacks than wired networks.
Security is the combination of processes, procedures, and systems used to ensure confidentiality, authentication, integrity, availability, access control, and non-repudiation.
Cryptographic techniques are used to provide security while transmitting data over a mobile network.
There are various security directing conventions and key administration plots that have been planned in light of cryptographic systems, for example, open key frameworks and character based cryptography. In fact, some of them are fully adapted to fit the network requirements on limited resources such as storage, CPU, and power limitations. For example, one way hash functions are used to construct disposable secret keys instead of choosing private key in public key infrastructure.
Public key cryptography is a primary concept in implementing wireless device

Renu Yadav

Assistant Professor (BCA)

No comments:

Post a Comment