Claim Missing Document
Check
Articles

Found 2 Documents
Search

Hybrid Cryptography for Random-key Generation based on ECC Algorithm P. Gayathri; Syed Umar; G. Sridevi; N. Bashwanth; Royyuru Srikanth
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1479.445 KB) | DOI: 10.11591/ijece.v7i3.pp1293-1298

Abstract

As more increase in usage of communications and developing them more user friendly. While developing those communications, we need to take care of security and safety of user’s data. Many researchers have developed many complex algorithms to maintain security in user’s application. Among those one of the best algorithms are cryptography based, in which user will be safe side mostly from the attackers.  We already had some AES algorithm which uses very complex cryptographic algorithm to increase the performance and more usage of lookup tables. So the cache timing attackers will correlates the details to encrypt the data under known key with the unknown key. So, for this we provide an improvised solution. This paper deals with an extension of public-key encryption and decryption support including a private key. The private key is generated with the combination of AES and ECC. In general AES, key length is 128 bits with 10 times of iterations. But with this, users won’t get efficient security for their operations, so to increase the security level we are implementing 196-bit based encryption with 12 times round-key generation iterations. By this enhancement, we can assure to users to high level security and can keep users data in confidential way.
Designing of Dynamic Re-clustering Leach Protocol for Calculating Total Residual Time and Performance Syed Umar; Yerragudipadu Subbarayudu; K. Kiran Kumar; N. Bashwanth
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1979.78 KB) | DOI: 10.11591/ijece.v7i3.pp1286-1292

Abstract

Wireless sensor networks (WSN), a plurality of sensors in an energy limited deliveries. the sensors are arranged randomly for many applications. Thus, the battery Or download a replacement would be practical. Therefore, the energy efficient routing protocol to expand the network. In this article we propose a new cluster based Re-Leach dynamic Protocol Dynamic Reclustering based Leach protocol (DR-Leach), the expansion of the lattice energy consumption and reduce the age. The idea is that the energy cluster leaders  next production cluster to balance In each round, the same number of nodes in the network of life. Make your first calculation It calculates the optimum amount of CHS in each round, and the optimum amount for each cluster. The results showed that the improvement of reliability protocols proposed frame and the total energy consumption than BCDCP Leach and protocols.