Highly secure data transmission for industrial network using blowfish algorithm in embedded processors
by K. Janakiraman; T. Baghyasree; D. Parkavi
International Journal of Advanced Intelligence Paradigms (IJAIP), Vol. 8, No. 2, 2016

Abstract: The security system of data transmission is the major aspects of all regions in today situations. Authentication is an important factor for secure transmission through wireless networking. The major problem of wireless data transmission is that the intruders are trying to track the original information or inject the false information. Cryptography technology provides the security system for transmission by using the symmetric key algorithm methods. The proposed system deals with the most secure transmission through wireless network by using the blowfish algorithm which is based on the lower end and higher end processor. The blowfish algorithm performs the action of encoding through ATmega8L processor and the decoding through LPC2148 processor. Lots of security systems were available for data transmission, but the existing system does not have the ability of powerful communications between users. This proposed system of prototype provides an efficient security system is facilitating by the symmetric key algorithm of blowfish algorithm. The encrypted and decrypted data's are displayed on PC via terminal window software. The primary goal of this proposed system is to achieve the major factors namely security, authentication, reliability, system speed and maintenance which are perfectly implemented.

Online publication date: Fri, 01-Apr-2016

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Advanced Intelligence Paradigms (IJAIP):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com