Geo-encryption protocol for mobile networks
Computer Communications
Data Encryption Technique Using Random Number Generator
GRC '07 Proceedings of the 2007 IEEE International Conference on Granular Computing
The golden section in the measurement theory
Computers & Mathematics with Applications
An Authenticity Verification Scheme Based on Hidden Messages for Current Civilian GPS Signals
ICCIT '09 Proceedings of the 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology
New directions in cryptography
IEEE Transactions on Information Theory
Hi-index | 0.00 |
The advancement in the field of Computer Networks and Information Technology has impelled researchers worldwide to focus on securing one's information while it travels over Internet to reach the intended recipient; and as an equally potential group of brains discover newer ways to intrude one's security systems, the research in the field of Information Security never seems to end up or saturate, since information may pertain to sensitive sectors including Financial sectors, trade secrets, Defense of Nations etc. which cannot be compromised with at any cost. In this thesis is proposed a new model of Network layer security where the chances of Eves-dropping or sniffing a packet at the Router is eliminated by using the Packet switched datagram concept of IPv4 where packets travel through unpredictable chain of Routers along multiple routes. The KEY to decrypt a Packet is not available in a static form, but dynamically generated depending on the location of the sender and travels as an Encrypted String producing a QR code image embedded in the payload. So, in a packet switched datagram approach, which does not guarantee that the successors of a packet must pass through the same router, following the same route, the chance of decrypting a sniffed packet at an EVIL Router is very little and we make it less and lesser following an incremental model to add to this concept, using GPS and other parameters of sender or receiver or both in the mathematical model of encryption to be used along with.