Abstract
Cryptography and network security is the concept of protecting the network and data transmission. Security of data is important, as data is transferred over unreliable network. Public-key cryptography provides optimal solutions to many of the existing security issues in communication systems. In our proposed algorithm we have used some of these secure algorithms in order to generate a highly secured algorithm which can deal with the various flaws of these algorithms. RSA, Reil-fence algorithm, substitution and transposition algorithms has been used in the proposed algorithm. Encryption over encryption is done in order to confuse the intruder. The proposed algorithm is used to provide multilevel security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Appadwedula, S., Veeravalli, V.V., Jones, D.L.: Energy-efficient detection in sensor networks. IEEE J. Sel. Areas Commun. 23(4), 693–702 (2005)
Bertsekas, D.: Dynamic Programming and Optimal Control, vol. I and II. Athena Scientific, Belmont (1995)
Hernández-Lerma, O., Lasserre, J.B.: Discrete-Time Markov Control Processes: Basic Optimality Criteria. Springer, New York (1996)
Lehmann, E.L., Casella, G.: Theory of Point Estimation. Springer, New York (1998)
Prasanthi, V.K., Kumar, A.: Optimizing delay in sequential change detection on ad hoc wireless sensor networks. In: IEEE SECON, VA, USA, pp. 306–315, September 2006
Rago, C., Willet, P., Bar-Shalom, Y.: Censoring sensors: a low communication-rate scheme for distributed detection. IEEE Trans. Aerosp. Electron. Syst. 32(2), 554–568 (1996)
Shiryaev, A.N.: Optimal Stopping Rules. Springer, New York (1978)
Veeravalli, V.V.: Decentralized quickest change detection. IEEE Trans. Inf. Theory 47(4), 1657–1665 (2001)
Wu, Y., Fahmy, S., Shroff, N.B.: Energy efficient sleep/wake scheduling for multi-hop sensor networks: non-convexity and approximation algorithm. IEEE Infocom 07, 1568–1576 (2007)
Zacharias, L., Sundaresan, R.: Decentralized sequential change detection using physical layer fusion. IEEE Trans. Wirel. Commun. 7(12), 4999–5008 (2007)
Omari, M.: An efficient application of a dynamic crypto system in mobile wireless security. In: IEEE International Conference on Wireless Communications and Networking, pp. 837–842 (2004)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Madaan, V., Sethi, D., Agrawal, P., Jain, L., Kaur, R. (2017). Public Network Security by Bluffing the Intruders Through Encryption Over Encryption Using Public Key Cryptography Method. In: Singh, D., Raman, B., Luhach, A., Lingras, P. (eds) Advanced Informatics for Computing Research. ICAICR 2017. Communications in Computer and Information Science, vol 712. Springer, Singapore. https://doi.org/10.1007/978-981-10-5780-9_23
Download citation
DOI: https://doi.org/10.1007/978-981-10-5780-9_23
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5779-3
Online ISBN: 978-981-10-5780-9
eBook Packages: Computer ScienceComputer Science (R0)