Secure Communication in Cognitive Radio Networks: A Study on Encryption Techniques and Key Management Schemes

Authors

  • Rajeev Kumar Bhaskar Assistant Professor, Department of CS & IT, Kalinga University, Raipur, India.
  • Susovan Kumar Pan Assistant Professor, Department of CS & IT, Kalinga University, Raipur, India.

DOI:

https://doi.org/10.31838/NJAP/06.03.07

Keywords:

Cognitive Radio, Communication, Security, Encryption.

Abstract

In the current era of electronic networks, security is becoming more and more important globally. Data communication and security are significantly impacted by the network connection made possible by devices like computers and smartphones. There are numerous books that describe how to use encryption and data concealing to communicate securely. Both encryption and decryption have employed a variety of algorithms. By employing safe communication methods like watermarking, steganography, and cryptography, researchers have attained a respectable level of legitimacy in data transfer via networks. In order to obtain robustness against a variety of threats, it is evident that a higher degree of accomplishment is achievable in the fundamental aspects of secured communication, such as confidentiality, integrity, and availability. There are many tools to fill the research gap and improve the ability to hide data using different methods. Since there is still opportunity to get better as far as safeguarding computerized information, similar to pictures, numerous strategies have been created to implant a lot of data without causing perceptual mutilation and to accomplish heartiness against pressure, added substance commotion, and picture altering assaults, which limits clamor and further develops data concealing in pictures and recordings.

Downloads

Published

2024-11-09

How to Cite

Rajeev Kumar Bhaskar, & Susovan Kumar Pan. (2024). Secure Communication in Cognitive Radio Networks: A Study on Encryption Techniques and Key Management Schemes. National Journal of Antennas and Propagation, 6(3), 53-59. https://doi.org/10.31838/NJAP/06.03.07

Similar Articles

11-20 of 61

You may also start an advanced similarity search for this article.