Title | An Approach to Fault Tolerant Key Generation and Secure Spread Spectrum Communiction |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Khan, Samar, Khodke, Priti A., Bhagat, Amol P. |
Conference Name | 2018 International Conference on Research in Intelligent and Computing in Engineering (RICE) |
Keywords | AES, attacks, Brute Force Attack, brute force attacks, client side encryption, Collaboration, complex Random key generation algorithms, cryptography, Fault tolerance, fault tolerant key generation, Fault tolerant systems, Force, group key generation algorithms, human factors, key generation, level encryption securities, level message security, mobile ad hoc network, mobile ad hoc networks, policy-based governance, pubcrawl, Secure Spread Spectrum, secure spread spectrum communication, Security parameters, Sensor networks, Servers, spread spectrum communication, telecommunication security, Wireless communication, wireless communications |
Abstract | Wireless communications have encountered a considerable improvement and have integrated human life through various applications, mainly by the widespread of mobile ad hoc and sensor networks. A fundamental characteristic of wireless communications are in their broadcast nature, which allows accessibility of information without placing restrictions on a user's location. However, accessibility also makes wireless communications vulnerable to eavesdropping. To enhance the security of network communication, we propose a separate key generation server which is responsible for key generation using complex random algorithm. The key will remain in database in encrypted format. To prevent brute force attack, we propose various group key generation algorithms in which every group will have separate group key to verify group member's identity. The group key will be verified with the session information before decryption, so that our system will prevent attack if any attacker knows the group key. To increase the security of the system, we propose three level encryption securities: Client side encryption using AES, Server side encryption using AES, and Artificial noise generation and addition. By using this our system is free from brute force attack as we are using three level message security and complex Random key generation algorithms. |
DOI | 10.1109/RICE.2018.8509084 |
Citation Key | khan_approach_2018 |