Loading

Routing Methodology for Secure Transmission of data in Physical Layer
S.Vandana1, T.Madhavi2

1S.Vandana*, Assistant Professor, Electronics and Instrumentation Department, VNR Vignana Jyhoti Institute of Engineering And Technology at Hyderabad
2T.Madhavi, Professor, Electronics and Communication, Department in GITAM Institute of Engineering And Technology at Vishakapatnam.

Manuscript received on November 17, 2019. | Revised Manuscript received on 25 November, 2019. | Manuscript published on December 10, 2019. | PP: 3144-3148 | Volume-9 Issue-2, December 2019. | Retrieval Number: A5100119119/2019©BEIESP | DOI: 10.35940/ijitee.A5100.129219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The difficulties of privacy and security in WANETs have taken on a step by step more vital responsibility as those networks persist to increase their role globally. Historically, physical layer is regarded as biased function addressed below the security, and all broadly used cryptographic protocols like Rivest-Shamir–adlemen, Advanced encryption standard and Data Encryption standard are developed and applied assuming an error-free physical layer already exists . Contrasting the traditional cryptography hwhich neglects distinction among the communication channels, the current physical layer safety accomplish data protection using well designing channel code consistent with the channel capacities assuming that the authentic data can never be recovered. The standard system protection makes use of encryption and deciphering activities inside the application layer. Under any circumstances, this won’t just construct the computational overhead of system. There’s no actual way to avoid eavesdropper listening in and assault from the physical layer. Addressing this problem, this paper proposes a basic system model in which the cooperative relay broadcast channel with the user cooperation is introduced and the overall performance metrics based on the physical layer safety can viably enhance the system protection limit. 
Keywords: WANETs, Cryptography, Eavesdropper
Scope of the Article: Cryptography and Applied Mathematics