ISSN : 2319-7323





INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ENGINEERING


Open Access

ABSTRACT

Title : A Way of Safeguard using Concept of Recurrence Relation and Fuzzy logic against Security Breach in Wireless Communication
Authors : Anirban Bhowmik, Dr.Sunil Karforma, Joydeep Dey, Dr.Arindam Sarkar
Keywords : Wireless security, Symmetric key, Recurrence Relation, Random Character Matrix, Session key, Fuzzy logic, Encryption, Decryption.
Issue Date : Jul-Aug 2020
Abstract : Wireless networking plays an important role in public and military applications. Security of infor-mation transfer through wireless networks remains a challenging issue. Wireless security is the pro-cess of designing, implementing, and ensuring security on a wireless computer network. Jamming and eavesdropping are two primary attacks at the physical layer of a wireless network. This article offers a study on the security vulnerabilities and threats on wireless communication and an efficient com-prehensive mechanism for improving the wireless network security. In this paper, a stream cipher based symmetric key encryption with recurrence relation and fuzzy based session key has been pro-posed for wireless communication by satisfying the key issues like security; increase the strength of symmetric key. In this article we generate ā€˜nā€™ number of sub keys from symmetric key using XOR operation between a random character matrix and symmetric key. In this article the random numbers are generated by using recurrence relation which is a new approach in random number generation in discrete mathematics. Among these sub keys we generate a session key using fuzzy function. Now the encryption is done by using this session key and symmetric key. Here we transmit the session key to the recipient end by amalgamating with the symmetric key. This amalgamated form is send to recipi-ent end for decryption. Here a new authentication scheme is used. Different types of randomness test have been done to test the randomness of our session key. The Brute-force attack analysis for this scheme and comparative study with existing standard methods has been done with satisfactory results.
Page(s) : 297-311
ISSN : 2319-7323
Source : Vol. 9, No. 4
DOI : 10.21817/ijcsenet/2020/v9i4/200904014