An efficient data transmission approach using IAES-BE
- PDF / 1,307,809 Bytes
- 13 Pages / 595.276 x 790.866 pts Page_size
- 37 Downloads / 202 Views
(0123456789().,-volV) (0123456789().,-volV)
An efficient data transmission approach using IAES-BE M. Indrasena Reddy1 • A. P. Siva Kumar2 Received: 24 January 2020 / Revised: 5 March 2020 / Accepted: 19 March 2020 Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Digital communication developed into an imperative element of infrastructure now-a-days. Many applications that operate infrastructure systems are internet-centered. Because of the nontrivial risks of information/data leakage, communication in the systems ought to be secured. Many techniques like cryptography are being employed on a large scale to furtively transmit information. But in the data transmission procedure, attaining the high data security along with high system efficiency is a difficult task. To trounce these difficulties, an efficient data transmission scheme utilizing improved advanced encryption standard with Butterfly Effect (IAES-BE) is proposed. The IAES-BE does the encryption procedure to thwart the data as of the attackers. The adaptive flower pollination algorithm (A-FPA) is employed for the key generation that augments the key’s complexity. After that, the generated key is implemented to the IAES-BE for encrypting the input plain-text as ciphertext. Next, the ciphertext is decrypted through revising the IAES-BE. Thereby, the original data will be attained and safely transmitted to the receiver. Centered on the investigational outcomes, the proposed work offered superior performance to the remaining data transmission methods. Keywords Cryptography Digital communication Advanced encryption standard Encryption Decryption Butterfly effect Key generation
1 Introduction Internet security and also privacy issue are of great concern today as it involves several hosts, networking devices, communication links or paths for efficient transport of data, file and also services in the applications like e-commerce, banking transactions, medical diagnostics, entertainment, multimedia, and many others. Hence, a communication or computer network that involves the infrastructure behind any application involves a large quantity of information transmission, storage in the real-time [1]. The pervasive things (for instances, radio-frequency identifications
& M. Indrasena Reddy [email protected] A. P. Siva Kumar [email protected] 1
School of Computer Science Engineering, R.G.M College of Engineering & Tech, Nandyal, Kurnool (Dt), A.P, India
2
Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Anantapur, Anantapur, Andhra Pradesh, India
(RFID) tags, computers, sensors, and mobile phones) can commune with each other at any time, any place, and in any means [2]. Also, millions of data in the text, real-time images, audios, and videos form are communicated over the network. Indeed, security is a challengeable concern for this entire idea [3]. Security has attained lots of significance with the progression of data innovation. Maintaining the secrecy and also th
Data Loading...