4.4 Article

Cellular Automata based Cryptography Model for Reliable Encryption Using State Transition in Wireless Network Optimizing Data Security

Journal

WIRELESS PERSONAL COMMUNICATIONS
Volume 119, Issue 1, Pages 877-918

Publisher

SPRINGER
DOI: 10.1007/s11277-021-08243-3

Keywords

Wireless communication; Encryption system; Advanced encryption system (AES); Cellular automata (CA); CA based encryption; Cryptography; State transition

Funding

  1. Computer Innovative Research Society, West Bengal, India [2020/CIRS/R&D/1010-01-16/CACMRESTWNODS]

Ask authors/readers for more resources

Authors propose a hardware-based approach for reliable encryption in wireless network using Cellular Automata (CA), which involves distinct layers of encryption in transmitter and receiver modules for enhancing data security. The proposed model includes processes such as capturing environmental noise, transmitting encrypted signals, analyzing received signals, and calculating protection ratio. Key features of this method include the selection of hardware components, measurement of time complexity, and code break complexity.
Authors propose a hardware based approach for reliable encryption in wireless network using Cellular Automata (CA). Distinct layers of encryption have been utilized in proposed model for enhancing data security. Transmitter and receiver modules are designed for performing state transition based encrypted activities. Transmitter module is required for capturing environmental turbulences (noise) from a specific geographical location and send encrypted signal to receiver module through wireless network. Receiver module analyses received signal after decryption for desired activities based on real time situations. Different hardware components are selected and compared based on market study targeting efficient construction of proposed modules. Time complexity and code break complexity are measured using different key lengths, keysets, and data sizes for proposed CA based encryption scheme achieving unique results in hardware based cryptography system. Encryption key length, index, and keyset are required for computing code break complexity in design model. Large data size is effectively managed to calculate protection ratio and reliability factor for realizing efficient protectiveness and accuracy. Comparative study between existing encryption technique and proposed CA based encryption technique is established based on time complexity and code break complexity.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available