Novel Framework for Maximizing Security over Wireless Network
Tejashwini N1, D R Shashi Kumar2, K Satyanarayana Reddy3

1Tejashwini N*, Research Scholar, Visvesvaraya Technological University, Belagavi, Karnataka, India.
2Dr. D R Shashi Kumar, Head of Department of Computer Science & Engineering, Cambridge Institute of Technology, Bengaluru, Karnataka, India.
3Dr. K Satyanarayana Reddy, Head of Department of Information Science & Engineering, Cambridge Institute of Technology, Bengaluru, Karnataka, India
Manuscript received on February 10, 2020. | Revised Manuscript received on February 22, 2020. | Manuscript published on March 10, 2020. | PP: 1-3 | Volume-9 Issue-5, March 2020. | Retrieval Number: E1967039520/2020©BEIESP | DOI: 10.35940/ijitee.E1967.039520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: With the increasing adoption of application running over wireless networking system, there is also an increasing security concern in it. Review of existing security protocols in wireless networks shows that they are highly specific to adversaries and hence they cannot be applicable with the dynamic state of network vulnerabilities. Apart from this, it was also explored that public key encryption requires a drastic change in its design methodology in order to make it more resource friendly for increased network lifetime. Therefore, this manuscript presents a novel framework that develops an enhanced model of public key encryption using algebraic structure that can generate an elite secret key. The study also introduces a design of an efficient trapdoor function which renders maximum resiliency towards different forms of lethal attacks as well as adhere to maximum security standards in wireless network. The study outcome shows that proposed system out performs frequently used existing security standards in many aspects. 
Keywords: Attacks, Public Key Cryptography, Security, Wireless Network
Scope of the Article: Wireless Communication