Learn More
The widespread applications of mobile ad hoc networks (MANET) and scarce network resources have lead to the development of many protocols in this field. The need of time is to find a protocol which makes efficient use of resources and improves the overall performance of the network. This paper focuses on enhancing the performance of ad hoc on demand(More)
—In this paper we propose a Lightweight Encryption Mechanism based on the Rabbit stream cipher for providing confidentiality in Wireless Sensor Networks (WSNs) that fulfils both requirements of security as well as energy efficiency. Our proposed security protocol is an idea for resource constrained WSNs, and can be widely used in the applications of secure(More)
The blind equalizer relies on the knowledge of signal's constellation and its statistics to perform equalization. The major drawback is that the blind equalizer will typically take a longer time to converge as compared to a trained equalizer. Variable Step-Size LMS (VSLMS) algorithms have been introduced to optimize the speed and steady-state error. The(More)
Interleave Division Multiple Access (IDMA) is a multiuser scheme which enables user separation on the basis of interleavers. Interleaver design can allow the IDMA system to approach near Shannon limits of channel capacity. Interleaver combats against Intersymbol Interference (ISI), channel fading and all sorts of noises. In addition, interleavers provide(More)
This paper presents a novel technique of image Enhancement which can be widely used in medical and biological imaging to improve the image quality. The principle objective of enhancement is to process an image so that the result is more suitable than the original image for a specific application. Image enhancement enhances weak edges or weak features in an(More)
Web-services are frequently used for interaction among various portals. If a Web-service is accessible to one client, it will be accessible for the rest of the world as well, with a limited option of restrictions on access. In order to control the accessibility of a Web-service, we have proposed 'access logic' to be incorporated within the same(More)
The next generation of broadband mobile communication system will face challenges caused by propagation characteristics of channel with much broader bandwidth as well as the need for a much higher throughput in a high mobility situation. Since radio bandwidth spectrum is limited, it is necessary to find techniques to increase spectral efficiency. The advent(More)
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In this paper, we present the implementation details of the Arcanum key exchange protocol along with its experimental analysis. We simulated a number of active and passive attacks in(More)
This paper proposes a Multi-Stream Cipher Stegnographic technique for high volume and secure data hiding in digital video and images. The proposed technique enables high rate of data embedding along with provisioning of confidentiality, integrity and authenticity security services. Embedding is carried out in spatial domain utilizing multiple stream ciphers(More)
  • 1