Title: Highly secure data transmission for industrial network using blowfish algorithm in embedded processors

Authors: K. Janakiraman; T. Baghyasree; D. Parkavi

Addresses: Faculty of ECE Department, Shanmugha Polytechnic College, SASTRA University, Tirumalaisamudhram, Thanjavur 613 401, Tamil Nadu, India ' Faculty of ECE Department, As-Salam College of Engineering and Technology, Thirumangalakudi, Aduthurai, Thanjavur 612102, Tamil Nadu, India ' Faculty of ECE Department, As-Salam College of Engineering and Technology, Thirumangalakudi, Aduthurai, Thanjavur 612102, Tamil Nadu, India

Abstract: The security system of data transmission is the major aspects of all regions in today situations. Authentication is an important factor for secure transmission through wireless networking. The major problem of wireless data transmission is that the intruders are trying to track the original information or inject the false information. Cryptography technology provides the security system for transmission by using the symmetric key algorithm methods. The proposed system deals with the most secure transmission through wireless network by using the blowfish algorithm which is based on the lower end and higher end processor. The blowfish algorithm performs the action of encoding through ATmega8L processor and the decoding through LPC2148 processor. Lots of security systems were available for data transmission, but the existing system does not have the ability of powerful communications between users. This proposed system of prototype provides an efficient security system is facilitating by the symmetric key algorithm of blowfish algorithm. The encrypted and decrypted data's are displayed on PC via terminal window software. The primary goal of this proposed system is to achieve the major factors namely security, authentication, reliability, system speed and maintenance which are perfectly implemented.

Keywords: blowfish algorithm; cryptography; ARM LPC2148; ATmega8L; wireless networks; secure data transmission; data security; network security; industrial networks; embedded processors; authentication; reliability; system speed; system maintenance.

DOI: 10.1504/IJAIP.2016.075725

International Journal of Advanced Intelligence Paradigms, 2016 Vol.8 No.2, pp.168 - 182

Available online: 28 Mar 2016 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article