Abstract

Security in the wireless network is a critical issue, so by most wireless and wired communication standards, orthogonal frequency division multiplexing (OFDM) is the most reliable modulation technique which has been adopted. To reduce the redundancy, storage requirements, and communication costs and to protect our data from eavesdropping, data compression algorithms are used. With the increasing demand of secure multimedia, there is a need to develop a new secured compression and encryption technique whose data contain graphic, video, images, and text files. Data compression offers an approach for reducing communication costs using effective bandwidth and at the same time considers the security aspect of the data being transmitted which is vulnerable to attacks. In this chapter, we have introduced new compression algorithm known as KSA, which is based on bit quantization and is the best technique which requires less encoding and decoding delay. The proposed algorithm is found most effective in terms of energy ,delay and throughput when data travels wirelessly through OFDM. Here, the objective was to carry out an efficient implementation of the OFDM system using different combinations of encryption and compression algorithm for the energy optimization on data transmission. Lots of text encryption algorithms based on rounds and keys have been proposed earlier. Some of them are time consuming and complex, some have little key space. While working, the best combination for the encryption and compression of the data transmission and energy optimization is found out and implemented in NS2 for finding different parameters such as delay, energy, and throughput. The latest trend in text encryption is chaos based for some unique characteristics and parameters. In this chapter, we further proposed a unique chaos-based encryption technique which when combines with LZW compression gives best results. This encryption differs from earlier encryption technique such as RSA, ECC, Interleaving, Hill-climber, AES, and DES and is suitable for practical applications having large data capacity. The combination of compression, cryptography, and chaotic theory forms an important field of information security in text. Tabulation of compression time, encryption time, decompression time, decryption time, compressed data size, total time taken for compression, entropy, and total time required for decompression and compression ratio is found.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.