Skip to main content

Public Network Security by Bluffing the Intruders Through Encryption Over Encryption Using Public Key Cryptography Method

  • Conference paper
  • First Online:
Advanced Informatics for Computing Research (ICAICR 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 712))

Abstract

Cryptography and network security is the concept of protecting the network and data transmission. Security of data is important, as data is transferred over unreliable network. Public-key cryptography provides optimal solutions to many of the existing security issues in communication systems. In our proposed algorithm we have used some of these secure algorithms in order to generate a highly secured algorithm which can deal with the various flaws of these algorithms. RSA, Reil-fence algorithm, substitution and transposition algorithms has been used in the proposed algorithm. Encryption over encryption is done in order to confuse the intruder. The proposed algorithm is used to provide multilevel security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Appadwedula, S., Veeravalli, V.V., Jones, D.L.: Energy-efficient detection in sensor networks. IEEE J. Sel. Areas Commun. 23(4), 693–702 (2005)

    Article  Google Scholar 

  2. Bertsekas, D.: Dynamic Programming and Optimal Control, vol. I and II. Athena Scientific, Belmont (1995)

    MATH  Google Scholar 

  3. Hernández-Lerma, O., Lasserre, J.B.: Discrete-Time Markov Control Processes: Basic Optimality Criteria. Springer, New York (1996)

    Book  MATH  Google Scholar 

  4. Lehmann, E.L., Casella, G.: Theory of Point Estimation. Springer, New York (1998)

    MATH  Google Scholar 

  5. Prasanthi, V.K., Kumar, A.: Optimizing delay in sequential change detection on ad hoc wireless sensor networks. In: IEEE SECON, VA, USA, pp. 306–315, September 2006

    Google Scholar 

  6. Rago, C., Willet, P., Bar-Shalom, Y.: Censoring sensors: a low communication-rate scheme for distributed detection. IEEE Trans. Aerosp. Electron. Syst. 32(2), 554–568 (1996)

    Article  Google Scholar 

  7. Shiryaev, A.N.: Optimal Stopping Rules. Springer, New York (1978)

    MATH  Google Scholar 

  8. Veeravalli, V.V.: Decentralized quickest change detection. IEEE Trans. Inf. Theory 47(4), 1657–1665 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  9. Wu, Y., Fahmy, S., Shroff, N.B.: Energy efficient sleep/wake scheduling for multi-hop sensor networks: non-convexity and approximation algorithm. IEEE Infocom 07, 1568–1576 (2007)

    Article  Google Scholar 

  10. Zacharias, L., Sundaresan, R.: Decentralized sequential change detection using physical layer fusion. IEEE Trans. Wirel. Commun. 7(12), 4999–5008 (2007)

    Article  Google Scholar 

  11. Omari, M.: An efficient application of a dynamic crypto system in mobile wireless security. In: IEEE International Conference on Wireless Communications and Networking, pp. 837–842 (2004)

    Google Scholar 

  12. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prateek Agrawal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Madaan, V., Sethi, D., Agrawal, P., Jain, L., Kaur, R. (2017). Public Network Security by Bluffing the Intruders Through Encryption Over Encryption Using Public Key Cryptography Method. In: Singh, D., Raman, B., Luhach, A., Lingras, P. (eds) Advanced Informatics for Computing Research. ICAICR 2017. Communications in Computer and Information Science, vol 712. Springer, Singapore. https://doi.org/10.1007/978-981-10-5780-9_23

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5780-9_23

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5779-3

  • Online ISBN: 978-981-10-5780-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics