Loading [MathJax]/extensions/MathMenu.js
A comparison of data encryption algorithms with the proposed algorithm: Wireless security | IEEE Conference Publication | IEEE Xplore

A comparison of data encryption algorithms with the proposed algorithm: Wireless security


Abstract:

Encryption algorithms play a main role in wireless network security systems. However, those algorithms consume a significant amount of computing resources such as CPU tim...Show More

Abstract:

Encryption algorithms play a main role in wireless network security systems. However, those algorithms consume a significant amount of computing resources such as CPU time, and packet size. In an attempt to remedy the wireless network security issue, a novel work has been deployed to secure the transmitted data over wireless network, called a secure WiFi (sWiFi) algorithm. The sWiFi algorithm is based on developed HMAC cryptography algorithm. This paper also provides evaluation of five encryption algorithms: AES (Rijndael), DES, 3DES, Blowfish, and the proposed algorithm (sWiFi). We examine a method for analyzing trade-off between efficiency and security. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different platforms and different encryption/decryption speed. The experimental evaluation shows that the sWiFi algorithm could provide an extra level of wireless security with relatively higher performance compared with other existing algorithms for e-content delivery applications over different zones of a wireless network.
Date of Conference: 16-18 August 2010
Date Added to IEEE Xplore: 16 September 2010
ISBN Information:
Conference Location: Seoul, Korea (South)

Contact IEEE to Subscribe

References

References is not available for this document.