کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
451111 694242 2013 18 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
An approach to provide a network layer security model with QR code generated with shuffled GPS parameters as embedded keys traveling over Internet using existing IPv4 mechanism
کلمات کلیدی
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
An approach to provide a network layer security model with QR code generated with shuffled GPS parameters as embedded keys traveling over Internet using existing IPv4 mechanism
چکیده انگلیسی

The advancement in the field of Computer Networks and Information Technology has impelled researchers worldwide to focus on securing one’s information while it travels over Internet to reach the intended recipient; and as an equally potential group of brains discover newer ways to intrude one’s security systems, the research in the field of Information Security never seems to end up or saturate, since information may pertain to sensitive sectors including Financial sectors, trade secrets, Defense of Nations etc. which cannot be compromised with at any cost. In this thesis is proposed a new model of Network layer security where the chances of Eves-dropping or sniffing a packet at the Router is eliminated by using the Packet switched datagram concept of IPv4 where packets travel through unpredictable chain of Routers along multiple routes. The KEY to decrypt a Packet is not available in a static form, but dynamically generated depending on the location of the sender and travels as an Encrypted String producing a QR code image embedded in the payload. So, in a packet switched datagram approach, which does not guarantee that the successors of a packet must pass through the same router, following the same route, the chance of decrypting a sniffed packet at an EVIL Router is very little and we make it less and lesser following an incremental model to add to this concept, using GPS and other parameters of sender or receiver or both in the mathematical model of encryption to be used along with.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computer Networks - Volume 57, Issue 11, 5 August 2013, Pages 2313–2330
نویسندگان
,