A. Arivazhagan
AMET University, Chennai

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

RTL Modelling for the Cipher Blcok Chaining Mode (Cbc) for Data Security Meenakshi R. K; A. Arivazhagan
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i3.pp709-711

Abstract

The demand of satellite communication, the security algorithms are to be designed in the board. The information from the satellite to the ground is required the data security with the cryptographic algorithms. Advanced encryption standard (AES) is one of the promising cryptographic algorithms for the terrestrial communication. In this paper, the encryption and decryption is mainly focused on the cipher block chaining (CBC) mode for achieving the high secured data transmission. For efficient data transmission, the AES algorithm is implemented by using CBC mode. The proposed work is designed by using RTL modeling and also the minimum numbers of logical elements are used for implementation. 
Execution Evaluation of End-to-end Security Conventions in an Internet of Things Sudha Mishra; A. Arivazhagan
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i3.pp719-720

Abstract

Remote Sensor Networks are bound to assume a crucial part in the cutting edge Internet, which will be described by the Machine-to-Machine worldview, as indicated by which; installed gadgets will effectively trade data, therefore empowering the improvement of creative applications. It will add to declare the idea of Internet of Things, where end to-end security speaks to a key issue. In such setting, it is essential to comprehend which conventions can give the correct level of security without loading the restricted assets of compelled systems. This paper displays an execution examination between two of the most broadly utilized security conventions: IPSec and DTLS. We give the investigation of their effect on the assets of gadgets.