Securing robot communication using packet encryption distribution

With the widespread deployment of mobile networks, wireless communications are increasingly preferred both by ordinary users and researchers working on mobile applications communication. Securing a wireless connection is essential since an eavesdropper might interrupt a connection to collect data illegitimately, or interfere with the transmission by adding misleading data, eliminating critical information, or altering transmitted messages. With the widespread deployment of mobile networks, wireless communications are increasingly important to both ordinary users and researchers. Securing a wireless connection is essential since an eavesdropper might interrupt a connection to collect data, or interfere with the transmission. Saad Al-Azzam, Ahmad Sharieh and Azzam Sleit of the University of Jordan and Nedaa Al-Azzam of Al-Dammam University propose an algorithm that secures both the message itself by employing a multi-level encryption technique and secures the transmission by broadcasting it over multiple interfaces.

[1]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[2]  Ivan Martinovic,et al.  On the Security of the Automatic Dependent Surveillance-Broadcast Protocol , 2013, IEEE Communications Surveys & Tutorials.

[3]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[4]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[5]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[6]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[7]  Robert Boncella Wireless Security: An Overview , 2002, Commun. Assoc. Inf. Syst..

[8]  Peng Ning,et al.  Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.

[9]  Kashif Saleem,et al.  Biological inspired secure autonomous routing mechanism for wireless sensor networks , 2011, Int. J. Intell. Inf. Database Syst..

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.