Corpus ID: 44051110

Wireless Transmission of Big Data Using Novel Secure Algorithm

@article{Thiagarajan2015WirelessTO,
  title={Wireless Transmission of Big Data Using Novel Secure Algorithm},
  author={K. Thiagarajan and K. Saranya and A. Veeraiah and B. Sudha},
  journal={World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering},
  year={2015},
  volume={9},
  pages={1461-1466}
}
  • K. Thiagarajan, K. Saranya, +1 author B. Sudha
  • Published 2015
  • Computer Science
  • World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering
  • This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of… CONTINUE READING
    3 Citations

    Figures, Tables, and Topics from this paper

    References

    SHOWING 1-10 OF 10 REFERENCES
    Improving Wireless Physical Layer Security via Cooperating Relays
    • 1,172
    • PDF
    Cooperative jam Technique to Increase Physical-layer Security in CWSN
    • 7
    Secure wireless communications via cooperation
    • 159
    • PDF
    Secret communication in presence of colluding eavesdroppers
    • S. Goel, R. Negi
    • Computer Science
    • MILCOM 2005 - 2005 IEEE Military Communications Conference
    • 2005
    • 111
    Wireless Secrecy in Cellular Systems With Infrastructure-Aided Cooperation
    • P. Popovski, O. Simeone
    • Computer Science, Mathematics
    • IEEE Transactions on Information Forensics and Security
    • 2009
    • 44
    • PDF
    Secret communication using artificial noise
    • R. Negi, S. Goel
    • Computer Science
    • VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005.
    • 2005
    • 446
    Security — A big question for big data
    • 17
    The wire-tap channel
    • A. Wyner
    • Computer Science
    • The Bell System Technical Journal
    • 1975
    • 5,687
    Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting
    • 124
    • PDF
    Complexity and cryptography - an introduction
    • 65
    • PDF