Wireless Transmission of Big Data Using Novel Secure Algorithm
@article{Thiagarajan2015WirelessTO, title={Wireless Transmission of Big Data Using Novel Secure Algorithm}, author={K. Thiagarajan and K. Saranya and A. Veeraiah and B. Sudha}, journal={World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering}, year={2015}, volume={9}, pages={1461-1466} }
This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of… CONTINUE READING
Figures, Tables, and Topics from this paper
3 Citations
References
SHOWING 1-10 OF 10 REFERENCES
Improving Wireless Physical Layer Security via Cooperating Relays
- Computer Science
- IEEE Transactions on Signal Processing
- 2010
- 1,172
- PDF
Secure wireless communications via cooperation
- Computer Science, Mathematics
- 2008 46th Annual Allerton Conference on Communication, Control, and Computing
- 2008
- 159
- PDF
Secret communication in presence of colluding eavesdroppers
- Computer Science
- MILCOM 2005 - 2005 IEEE Military Communications Conference
- 2005
- 111
Wireless Secrecy in Cellular Systems With Infrastructure-Aided Cooperation
- Computer Science, Mathematics
- IEEE Transactions on Information Forensics and Security
- 2009
- 44
- PDF
Secret communication using artificial noise
- Computer Science
- VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005.
- 2005
- 446
Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting
- Computer Science
- IEEE Transactions on Wireless Communications
- 2011
- 124
- PDF