You are on page 1of 12

International Journal of Computational Intelligence and Information Security, February 2012 Vol. 3, No.

Security Services Over Bluetooth Communication Network In Distributed Environment


Ganesh Chandra1, Sanjay Kumar Sonkar1,Vinod Kumar Yadav1, Satyendra Singh1 Rahul Kumar Gangwar2 M. Tech. Student1, Department of Computer Science & Engineering, Kamla Nehru Institute of Technology, Sultanpur (U.P.) India B. Tech. Student2, Department of Computer Science & Engineering, Invertis Institute of Engineering & Technology, Bareilly (U.P.) India E-mail: {ganesh.iiscgate@gmail.com, kumarsanjaysonkar@gmail.com, vinodrockcsit@gmail.com, satyendra.cse@gmail.com, rahul.gangwar36@gmail.com}

Abstract
A distributed system is a collection of computes that are connected via a communication network (wired or wireless communication network). Distributed System has become common place due to the wide availability of low-cost, high performance computers and network devices. However, the management infrastructure often does not scale well when distributed systems get very large. Distributed Wireless Communication System (DWCS) is a system that depends not only on wireless technologies, but also an Internet Technologies. Wireless Communication Networks (WCNs) are gaining popularity in many application areas because of their low cost and high flexibility. Communication of any mode in the modern days is effective only the nodes in the network should be completely away from physical connection in the form of wireless manner. Particularly for short range of communication, Bluetooth is the best option. Bluetooth is a new developing wireless networking technology for short range applications. Bluetooth is a way of connecting machines to each other without cables or any other physical medium. It uses radio waves to transfer information, so it is very susceptible to attacks. The basic unit in a Bluetooth network is piconet, which can contain up to 8 active nodes. Two or more piconets may connect with each other to form the so called scatternet. One ofthe importance issues for Bluetooth Technology is security. The paper focuses on security mechanisms that are needed to provide secure communication among the nodes in the Bluetooth Communication Network (BCN), such as key management, AES (Advanced Encryption Standards) and authentication.

Keywords: Distributed System, Bluetooth Technology, Communication Protocol, AES.

1.Introduction
A distributed system is collection of computers that are connected via a communication network. Usually, in large-scale distributed systems; it is much more difficult to provide software that is fault-tolerant, reliable, manageable and easy to use than in small-scale distributed systems. A distributed system is system consisting of computers that do not share a common memory or asynchronized clock. A computer accesses remote resources via the communication network. Generally, it is more expensive to access the remote resources than to access the local resources because of the communication delays and the CPU overhead to process communication protocols [1]. The motivation behind the development of distributed systems is the availability of low-cost, high performance computers and network devices. When a few powerful computers are connected and communicate with each other, the total computing power available can be enormous. Such a system can have a higher performance /price ratio than a single supercomputer.

International Journal of Computational Intelligence and Information Security, February 2012 Vol. 3, No. 2

CPU

Cach

CPU

Cach

Memory
NIC PC NIC

Memory
PC

Communication

Network

CPU

Cach

CPU

Cach

Memory

Memory
PC PC

NIC

NIC

Figure 1: Architecture of the distributed system

1.1 Techniques for Communication


In Distributed System, communication channel can be done in two ways partially connected communication channel or fully connected communication channel. In a partially connected communication channel, direct links exist between some, but not all, pairs of computers .Some of the examples of partially connected channel are star structured communication channel, ring structured communication channels, tree- structured communication channel. In a fully connected communication channel, there are direct links between all pairs of computers. The problem with such a system is that a adding new nodes to the system results in the increase of each nodes degree, which results in opening more file descriptors and more complexity for each node to implement the connections .Thus the scalability of such systems is limited by each nodes capacity to open file descriptors and the ability to handle the new connections. i. Connection event: The constructions event happens when a new node wants to join the system .The new node sends registration request to the master node and the master node computes the position for the new node. ii. Recovery event: The recovery event happens when a slave node fails. The neighboring nodes of the failed node report the failure to the master node. The master node computes a method to recovery the system structure [2]. 1.2 Distributed-Shared Memory Distributed-shared memory system(DSM) provide the convenience of a shared-memory programming model, where all processor have access to a shared address space ,on the top of a low-cost distributed system[3].These system allow processes to assume a globally shared virtual memory even though they execute on nodes that do not physically share memory. The environment is transparent to the programmer, software mechanism transform all the shared data accesses in message over the network. The implementation of the virtual shared memory in a cluster requires the use of a software distributed shared memory system(SDMS). When a processor wants to access data that belongs to other processor, the SDSM system automatically brings in the data through the network, as shown in figure1. As clusters have become the most appealing platform for cost-effective high-performance computing, SDSM systems are a low-cost alternative to provide shared data in these platforms.

International Journal of Computational Intelligence and Information Security, February 2012 Vol. 3, No. 2

Network

Processor

Processor

Processor

Memory Node0

Memory Node1

Memory Node n

SDSM System

Figure 2: The distributed shared memory abstraction

2. Related Work
Due to the lack of space to cover the vast area of multi agent system, we restrict our related work to blackboard implementation historically; the black board model arose from abstracting features of the HEARSAY II speech understanding system [4]. The initial idea was to build an architecture for Knowledge based systems, where independent Knowledge Sources(KSs) communicate only through a shared blackboard .For parallel and distributed execution of KSs , there are three different design alternatives : shared memory blackboard , blackboard server and distributed blackboard approach. In the shared memory approach each KS has direct access to shared structure. The work by Ensor and Gabble[5] is a good example of this kind of system but relies on a multiprocessor architecture. In order to solve the scalability problem of the black board server solution, some distributed blackboard solutions were proposed. The work by Jiang et al. [6] proposed the construction of blackboard communication architecture based on graph theory. Secure Distributed Operating system Project(SDOS), the borrows heavily from the Cronus distributed computing environment developed by BBN(Bolt Beranek and Newman)[7,8,9].The object model , the client server model , and other features of the architectures come from Cronus as will much of the code , but the system architecture and the detailed design include major departures from the Cronus Worksimplifications , enhancements , and redesigns to support SDOSs security and assurance goals . The Experimental SDOS project at BBN and (Odyssey Research Associates) to investigate multi-level security issues for the development of a secure distributed operating with classA1 assurance[10,11].

3.Wireless Communication Network System In Distributed Environment


A wireless communication network consists of different sensors to monitors environmental parameter such as temperature, sound, pressure or motion. A wireless communication network is based on real time changes in environment by a network of sensors. So wireless communication system are used to solve various problems related to real time monitoring. In real time environment security is an essential requirement to send secure data to the base station on time without any changes in wireless communication system. In this system nodes are small and inexpensive computers that have limited computation and wireless capabilities. In this network, it is extremely important to provide certain basic security mechanism and protocols in order to avoid attacks from malicious adversaries or unauthorized persons. This system can be represented by following figure 3:

International Journal of Computational Intelligence and Information Security, February 2012 Vol. 3, No. 2

Figure 3: WSN communication model

Wireless Communication System or Wireless Sensors Networks (WSNs) [12] are a variant of Low Power Wireless Personal Area Network (Low PANs). Considered efforts are being deployed to integrate Low PANs with other wired and wireless IP networks, in order to make use of pervasive nature and the existing infrastructure associated with IP technologies. The Internet Engineering Task Force (IETF) is standardized the deployment of IPv6 over Low PANs through a working group known as 6 low PAN. Low PAN has introduced the notion of IP-based Wireless Sensors Networks (IP-based WSNs). Indeed, the emergence of IP-based WSNs makes the need to define security mechanism more and more important

.
Figure 4: Wireless communication network model

3.1 Functionalities of node in the system To provide reliable services to the end users, both the master node and slave nodes are responsible for resource management and system structure maintenance. To monitor and manage the system status and the system resources, the master node gathers the working status and resources usage information of all salve nodes and sends instructional message to slave nodes periodically. Each slave node is responsible for generating messages to report its working status and resource usage .These messages are called the resource management messages. Each slave node is also responsible for forwarding the messages from its parent node to its child nodes and merging the resource management messages from its child nodes and forwarding the merged message to its parent node. To manage the system resources and maintain the system structure, there are two types of messages transmitted along the network links, the resource management messages and the system structure maintenance messages. Since both of these messages require reliable delivery services, TCP is used as the transport protocol [13]. To transmit these two kinds of messages, there are two types of connections in the system: permanent connections and temporary connections. The permanent connections are used to transmit the resource management messages. All nodes in the system are connected to their neighboring nodes by permanent connections. The reason we the permanent connections to transmit the management messages is

International Journal of Computational Intelligence and Information Security, February 2012 Vol. 3, No. 2

the overhead of TCP three-way handshake protocol and four-way termination . The resource management messages are periodically exchanged between the neighboring nodes. Once a connection is established between the neighboring nodes, it is persistent. There is no need to established a new connection for each resource management message. Using permanent connections to transmit the resources management messages decreases the overhead of the establishing and the closing of the network connection. The temporary connections are used to maintain the system structure. For both the construction and recovery event, there is a group of system structure maintenance messages transmitted between the master node and a slave node. A temporary connection is for transmitting a given group of messages. After the transmission of the given group of messages, it is not necessary for the temporary connection to exit. Using temporary connections to transfer the system structure maintenance messages can release the load burden of the master node. 3.2 Types of Delay between Communication Nodes The delay time sequence of information transmitting from source node to destination node involves three parts: internal delay of source node, network transmission delay and internal delay of destination node [14].Internal delay of source node involves two parts: processor delay and transmission wait delay. Processor delay involves hardware interface processor delay, control application accounting delay and protocol composing delay, etc. Transmission wait delay involves information queue wait delay and network blocking delay. Similarly, destination node also has two parts of delay: transmission wait delay and processor delay. But transmission wait delay of destination node only includes information queue wait delay .Its processor delay involves protocol partition delay , control application accounting delay and hardware interface processing delay, etc. Network transmission delay includes two parts: data frames sending and signal delay. Length of data frames sending time is depending on static services indexes such as network speed, data frames length, etc. Signal delay is the transmission time of electronics signal in the line. The time sequence of node information transmission is shown in figure.
Source Node Destination Node

Control Application

TS

TD
-processor

-processor

Control Application

TS-delay

TD-delay

TSCommunication Protocol

Wait

TD-Wait

Communication Protocol

Figure 5: Time sequence of node information transmission

4.Bluetooth Communication Network


Now a days driven by the technology advancements and introducing mobile computing networking capabilities have been extended to mobile devices, such as mobile phones, PDAs, etc. In order to provide efficient communication capabilities among these devices, the wireless networking technologies plays an important role. Currently, Bluetooth is one of the most commonly used ad-hoc wireless networking technology. Similar to the other wireless networking technologies the Bluetooth uses open-air media that makes it involved with the security and interference issues [15]. Bluetooth has been introduced since 1994 when Ericssons communication group started to find out efficient mobile interface between cell phones and neighboring devices. The research on Bluetooth has been actively

International Journal of Computational Intelligence and Information Security, February 2012 Vol. 3, No. 2

conducted since 1998 when SIG (Special Interest Group) consisting of Ericsson, Nokia, IBM, TOSHIBA and Intel was organized. Bluetooth is mobile communication protocol providing information to each mobile devices. Many devices sharing a channel from piconet centering on a master of mobile device and are expanded to scatternet [16, 17]. Bluetooth is a low-cost and low-power short -range radio technology. Many useful applications can be supported by ad hoc network over Bluetooth. For example, in a conference room, a special announcement can be broadcast among the different Bluetooth-enabled mobile devices. However, the current Bluetooth only supports operation in so- called piconets which are single-hop ad hoc networks consisting of one master devices and up to seven active slaves. A Bluetooth ad hoc network can be formed by interconnecting piconets into scatternets [18], which is multi-hop network and a challenging subject of current research[19]. In a Bluetooth network there are two types of nodes: a slave and master. Bluetooth networks are divided into two kinds, piconet and scatternet. 4.1 Bluetooth Piconet A group of devices sharing a common channel is called a piconet. A piconet consists of two or more connected nodes sharing the same channel. Every piconet consists of up to seven slaves and one master who determine the timing and the hopping sequence in the piconet. Figure 6 depicts a piconet topology consisting of four Bluetooth units.
Master

Slave

Figure 6: A piconet topology

4.2 Bluetooth Scatternet Furthermore, two or more piconets can also be interconnected via bridge nodes to form a larger ad hoc network so-called a scatternet. Because a Bluetooth unit can only transmit and receive data in one piconet at a time , those bridge nodes are capable of times sharing between multiple piconet. A bridge node can be a master in one piconet and slave in other (M/S bridge node) or slave in multiple piconets (S/S bridge node). Figure 7 depicts a scatternet consisting of three piconets.

Figure 7: A Scatternet Topology

International Journal of Computational Intelligence and Information Security, February 2012 Vol. 3, No. 2

4.3 Bluetooth Connection and Pairing Bluetooth is a system in which connection are made between a master and a slave. These connections are maintained until they are broken, either by deliberately disconnecting the two, or by the link radio becoming so poor that communications cannot be maintained typically this occurs as the devices go out of range of each other[19].Within the connection process , there are four types of Bluetooth connection channel: (i) Basic piconet channel: This Bluetooth connection channel is used only when all 79 channels are used within the hopo-set. It is now rarely used as the Adaptive piconet channel is more often used as it provides greater flexibility. (ii) Adapted piconet channel: This Bluetooth connection channels is used more widely and allows the system to use a reduced hop-set, i.e between 20 and 79 channels. Piconet channels are the only channels that can be used to transfer user data. (iii) Inquiry channel: This Bluetooth connection channel is used when a master devices finds a slave devices or devices within range. (iv) Paging Channel: This Bluetooth connection channel is used where a master and slave device make physical connection. 4.3.1 Bluetooth Pairing The Bluetooth pairing process is typically triggered automatically the first time a device receives a connection request from a device with which it is not yet paired. In order that Bluetooth pairing may occur, a password has to be exchanged between the two devices. This password or Passkey as it is more correctly termed is a code shared by both Bluetooth devices. It is used to ensure that both users have to pair with each other [19]. The process of Bluetooth pairing is summarized below: Step1: Bluetooth device looks for other Bluetooth devices in range: To be found by other Bluetooth devices, the first devices, Device 1must be set to discoverable modethis will allow other Bluetooth devices in the vicinity to detected its presence and attempt to established connection. Step2: Two Bluetooth devices find each other: When the two devices: Devices 1 and Devices 2 find each other it is possible to detect what they are. Normally the discoverable device will indicate what type of device it is cell-phone, headset, etc., along with its Bluetooth device name. The Bluetooth device name is the can be allocated by the user, or it will be the one allocated during manufacture. Step3: Prompt for Passkey: Often the default passkey is set to 0000, but it is advisable to use something else as hackers will assume most people will not change this information.

10

International Journal of Computational Intelligence and Information Security, February 2012 Vol. 3, No. 2

5. Communication Protocol in Distributed Environment


The Bluetooth specifications include a limited set of these basic security services, and as such, the level of security that can be implemented with native Bluetooth features is limited. The following security services are provided by the Bluetooth specification: 5.1 Authentication The ability to identify devices before and during connection and communication is provided by Bluetooth. With a shared link key, two devices can authentication to each other. The authentication procedure is a challenge-response process. The algorithm for authentication is E1 [20], which uses the encryption function, SAFER+ [20], to calculate a secure authentication code. The algorithm is shown in Figure 8. R BD A Link E1 A SE

Figure 8: Authentication Protocol E1

A verifier generates a random number R and sends it to the claimant. After receiving R, the claimant calculate a signed response SRES=E1(R, BD_ADDRC, Klink), in which BD_ADDRC is the source device address. Then the claimant passes the SRES to the verifier. The verifier also calculates a signed response SRES = E1(R, BD_ADDRC, Klink) and compares SRES with SRES. If they are equal, the authentication process is successful. Another output of E1 is ACO (authentication ciphering offset), which will be used for the generation of encryption key. 5.2 Confidentiality The ability to protect communications during transmission over the network is provided by Bluetooth. Confidentiality is important for private communications over wireless links because the nature of wireless networking leaves the communication between nodes subject to eavesdropping by unauthorized parties. Confidentiality of network communications in Bluetooth is provided through the use of encryption, with the use of encryption being optional and determined by the selection of one of three encryption modes during communication. The Bluetooth specification outlines three specific encryption modes. These modes are intended to limit encryption key ambiguity and speed processing of encrypted data in both point-to-point and broadcast traffic situations. Bluetooth uses E0, a stream cipher, as the basis for the encryption processing associated with these encryption modes. The defined modes include [18]: Encryption Mode 1 No encryption. All traffic is unencryption when Encryption Mode 1 is used.

Encryption Mode 2 Traffic between individual endpoints (non-broadcast) is encryption with individual link keys. Broadcast traffic unencrypted. Encryption Mode 3 Both broadcast and point-to-point traffic is encrypted with the same encryption key (the master link key). In this mode, all traffic is readable by all nodes in the piconet (and remains encrypted to outside observers). Note that the notion of privacy in Encryption Mode 3 is predicated on the idea that all nodes in the piconet are trusted because all nodes will have access to the encrypted data.

11

International Journal of Computational Intelligence and Information Security, February 2012 Vol. 3, No. 2

5.3 Authorization:
Authorization in Bluetooth allows for decision making about resource access and connection configuration (that is, authentication and encryption requirements) to be made based on the permissions granted a given Bluetooth device or service. Two of the primary means of implementing authorization in Bluetooth are device trust levels and service security levels.

(i) Device Trust Levels:


Bluetooth devices can have one of two trust levels in relation to other Bluetooth Devices: trusted or untrusted (refer to the Wireless Security page at the Bluetooth website). Trusted devices have previously been paired with the device, and will have full access to services on the Bluetooth device. Untrusted devices have not previously been paired with the device (or the relationship has been otherwise removed), and will have restricted access to services.

(ii) Service Security Levels:


Bluetooth services (applications that use Bluetooth) have one of three security level [21]: Service Level 1 These services require device authentication and authorization. Trusted devices will be granted automatic access to these services. Manual authentication and authorization will be required before untrusted devices are granted access to these services. Service Level 2 These services require authentication, but do not require authorization. Service Level 3 These services have no security and are open to all devices.

5.4 Advanced Encryption Standard


Advanced Encryption Standard (AES) is a specification for the encryption of electronic data [22]. In Distributed Communication System, connected by Bluetooth Technology, The brute-force attacks are impossible because 128 bits minimum key size for AES .Such AES must have high computational efficiency so as to be usable in high speed applications such as broadband links.

Figure 9: Key block round combination.

AES become the replacement for Triple DES and DES. DES in particular was found to be weak and breakable. AES is a popular encryption standard approved by the government and supported by all VPN

12

International Journal of Computational Intelligence and Information Security, February 2012 Vol. 3, No. 2

vendors [23]. AES today is also used in removable media such as USBs and external hard drive. It is effective in both hardware and software and useless memory than most other symmetric algorithms.
Table: AES Parameter
Key size (words/bytes/bits) Plaintext block size (words/bytes/bits) Number of rounds Round Key size (words/bytes/bits) Expanded Key size (words/bytes) 4/16/128 4/16/128 10 4/16/128 44/176 6/24/192 4/16/128 12 4/16/128 52/208 8/32/256 4/16/128 14 4/16/128 60/240

AES Algorithm 1. Key Expansion: Round keys are derived from the cipher key using Rijndael's key schedule. Initial Round: Round Key: each byte of the state is combined with the round key using bitwise XOR.

2.

3. Rounds: (i). Sub Bytes: A non-linear substitution step where each byte is replaced. Uses an S-box to perform a byte-by-byte substitution of the block (ii). Shift Rows: A transposition step where each row of the state is shifted cyclically a certain number of steps using simple permutation. (iii). Mix Columns: A mixing operation which operates on the columns of the state, combining the four bytes in each column. A substitution that makes use of arithmetic over GF (28 ).

(iv). Add Round Key: A simple bitwise XOR of the current block with a portion of the expanded key. 4. Final Round (No Mix Columns) SubBytes ShiftRows AddRoundKey

6. Future Scope
In our Distributed System for communication system there is only one master node and so many slave nodes. It is very difficult responsibility to manage the communication structure. If the master node fails, all the information about the communication system will be lost and there will be no node left to manage the system. One of our future tasks is to construct a backup master node that will backup the system structure

13

International Journal of Computational Intelligence and Information Security, February 2012 Vol. 3, No. 2

information continuously .In case that the master node fails , the backup master node can be used to assume control and manage the system structure.

7. Conclusion
Distributed communication system is a complicated system which has closely relationship detection and network communication system. The research has certain guide meaning for quantitative analysis on communication network and system performance on distributed detection system .We believe an efficient implementation of a single address space across multiple machines is possible by combining highperformance DSM(Distributed Shared Memory) and RPC (Remote Procedure Call) mechanisms to provide both data movement and function shipping. Such a system provides the capability to transparently replicate server functions on the client machines. This paper gives out a scheme for Distributed environment for communication system by based on Bluetooth secure protocol. In this system, eavesdropping by outsider (i.e. node except the scatternet member) is eliminated because all of the communications are encrypted using secret keys by AES protocol. The man-in-the-middle attack cannot be possible because all of the communications in the scatternet are controlled by the master in each piconet where the virtual IDs of the nodes are stored. Any device ID other than listed nodes would be ignored.

8. References
[1]. Mukesh Singhal and Niranjan G. Shivaratri, Advanced Concepts in Operating Systems, McGraw-Hill, 1994. [2]. Huang, M.; Bode, B.; , "A performance comparison of tree and ring topologies in distributed systems," Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International, vol., no., pp. 8 pp., 4-8 April 2005. [3]. K.Li. Ivy: A shared virtual memory system for parallel computing. In Proceedings of the 1998 International Conference on parallel Processing, pages94-101, 1988.

[4]. E. Lee, F.H.R,V.Lesser , and R. Raj. The hearsay-ii speechunderstanding system: Integrating Knowledge to resolve uncertainty. Computing Servys, 12(2)213-253, 1980.

[5]. J.R Ensor and J.D.Gabbe, Transaction blackboards. In Distributed Artificial Intelligence,1988
[6]. Y. Jiang, P.Yi, S.Zhang , and Y.Zhong. Constructing agents blackboard communication architecture based on graph theory Computer Standard and Interfaces, 27(1):285-301,2004 [7]. R. Schantz, R.Thomas and G.Bono. The Architecture of the Cronus Distributed Operating System.In Proceedings of the IEE sixth International Conference on Distributed Computing Systems . May, 1986. [8]. BBN Systems and Techhnologies Corporation. Cronus, A Distributed Operating Sytem.: Revised System/Subsystem Specifiaction.BBN Report No.5884, Revision 1.6, August, 1988. [9]. R. Schantz and R. Thomas. Cronus , A Distributed Operating System:Functional Definition and System Concept. BBNReport No. 5879,Revision 2.2 , December , 1988 [10]. Stephen T.Vinter et alia. The Secure Dsitributed Operating System Project .RADC-TR-88-127, June, 1988. [11]. Thomas A. Casey et alia. A Secure Distributed Operating Ssytem. In Proceeding of the 1988 IEEE Symposium on Security and Privacy, April, 1988. [12]. G. Montenegro, N. Kushalnagar , D. E. Culler, and J. W. Hui,Transmission of IPv6 Packets over IEEE 802.15.4 Networks. Internet-Draft Version 13, IETF, April 2007. Networks, Vol. 8, No. 1, pp. 16-29, Feb 2001. [13]. W.Richard Stevens, UNIX Network Programming, Volume 1, Second Edition, Prentice Hall, 1998.

14

International Journal of Computational Intelligence and Information Security, February 2012 Vol. 3, No. 2

[14]. Shi Jiu-geng , Zhang Pei-reng , Cheng Zheng-rong. Industry Press, 2004(in Chinse).

CANBUS System Design Technology ,National Defence

[15]. Forouzan Behrouz A.Data Communication and Networking , 3rd edition. McGraw-Hill, 2004,pp 372-379. [16]. Bin Lu, Udo W.Pooch, A Lightweight Auther Mobile Ad hoc Networks, International Journal of Information Technology Vol.11 , No.2, pp.546-551, 2005. [17]. Pilu Crescenzi , Carb Nocentini, Andrea Piietracaprina Geppino Pucci, Carlo nSandri , On the Connectivity of Bluetooth- Based Ad Hoc Networks, Euro-Par 2007 , pp960-969, 2007

[18]. http://www.radio-electronics.com /info/ wireless/ Bluetooth / networks-networking-connectionspairing.php


[19]. http://programming4.us/mobile/3774.aspx [20]. The Bluetooth Core specification, v.1.2, November 2003. http//www.bluetooth.org/spec/ [21]. Bluetooth Special Interest Group, Bluetooth Security White Paper, May 2002,

http://www.bluetooth.com/NR/rdonlyres/E870794C-2788-49BF-96D3 9578E0AE21D/0/securitywhitepaper v1.pdf [22]. www.wikipedia.com/AdvancedEncryption_Standard.htm [23]. William Stallings, Cryptography and Network Security, prentice hall, 4th edition.

Biographies
Ganesh Chandra was born in Kanpur, India. He received the B.Tech. Degree in Computer Science and Engineering in 2009 from Dr. Ambedkar Institute of Technology for Handicapped, Kanpur, India. He is currently pursuing M.Tech in Computer Science and Engineering at Kamla Nehru Institute of Technology, Sultanpur, U.P., and India. His areas of interest in research are Operating System, Cryptography and Network Security. Sanjay Kumar Sonkar was born in Varanasi, U.P., India. He received the B.Tech degree in Computer Science & Engineering in 2010 from, Radha Govind Engineering College, Meerut (U.P.), India. Presently he is an M.Tech student in Computer Science & Engineering from one of the premier institute of this state (i.e. Kamla Nehru Institute of Technology, Sultanpur). Being a technocrat and a research scholar his areas of interest extends to Software Testing and Cryptography & Network Security.

Vinod Kumar Yadav was born in Jaunpur, India. He received the B.Tech. Degree in Computer Science and Information Technology in 2008 from I.E.T., M.J.P. Rohilkhand University Bareilly, India. He is currently pursuing M.Tech in Computer Science and Engineering at Kamla Nehru Institute of Technology, Sultanpur, U.P., and India. His areas of interest in research are Cryptography and Network Security, Database. Satyendra Singh was born in Bareilly, India. He received the B.Tech. Degree in Computer Science and Engineering in 2009 from Invertis Institute of Engg & Technology, Bareilly, India. He is currently pursuing M.Tech in Computer Science and Engineering at Kamla Nehru Institute of Technology, Sultanpur, U.P., and India. His areas of interest in research are Cryptography and Network Security, AODV. Rahul Kumar Gangwar was born in Bareilly, India. He is currently pursuing the B.Tech. Degree in Computer Science and Engineering from Invertis Institute of Engineering & Technology, Bareilly, India.. His areas of interest in research are Cryptography and Network Security, Networking, Data Structure.

15

You might also like