| Peer-Reviewed

Design of Secure Ad Hoc Network Using Three Dimensional Discrete Wavelet Transformation Based on Performance Enhancement

Received: 16 December 2014    Accepted: 10 January 2015    Published: 22 January 2015
Views:       Downloads:
Abstract

This work shows new and efficient algorithm of cryptographic purpose based symmetric and conventional techniques that considers the representation of the cipher text by using the three dimensional Discrete Wavelet Transform to find the wavelet decomposition vector containing the approximation and the detail coefficients then build the three dimensional data structure approach. The decryption is done by extracting the encrypted data from the wavelet decomposition vector using the algorithm of inverse Discrete Wavelet Transformation. The encrypted message consists the wavelet decomposition vector. The key is used for authorization purpose to access the network. Results shows great data security and BER over wireless channels based Ad Hoc network.

Published in American Journal of Networks and Communications (Volume 4, Issue 3-1)

This article belongs to the Special Issue Ad Hoc Networks

DOI 10.11648/j.ajnc.s.2015040301.17
Page(s) 35-44
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

3D-Discrete Wavelet Transform, Cryptography, Signal Processing, Symmetric Cryptography, Wavelet Decomposition

References
[1] Amara Graps, “An Introduction to Wavelets,” IEEE Computational Science and Engineering, vol. 2, num. 2, published by the IEEE Computer Society, Summer 1995.
[2] S. Mallat. A Theory for Multiresolution Signal Decomposition: the Wavelet Representation. IEEE Transaction on Pattern Analysis and Machine Intelligence, 11, pp. 674-693, 1989 H. Simpson, Dumb Robots, 3rd ed., Springfield: UOS Press, 2004, pp.6-9.
[3] M. Vishwanath and C. Chakrabarti, “A VLSI Architecture for Real-Time Hierarchical Encoding/Decoding of Video using the Wavelet Transform,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’94), Adelaide, Australia, vol. 2, April 19–22, 1994, pp. 401–404.
[4] M. Weeks, et al, “Discrete Wavelet Transform: Architectures, Design and Performance Issues,” Journal of VLSI Signal Processing 35, 155–178, 2003.
[5] Md. ShoaiburRahmanl, Md. AynalHaque, “Introduction to a Novel Wavelet,” IEEE/OSA/IAPR International Conference on Informatics, Electronics & Vision, 2012.
[6] V.Senk, V. D. Deli´c,V. S. Miloˇsevi´c, “A New Speech Scrambling Concept Based on Hadamard Matrices,” IEEE SIGNAL PROCESSING LETTERS, VOL. 4, NO. 6, JUNE 1997.
[7] H. Ojanen. “Orthonormal compactly supported wavelets with optimal sobolev regularity. Applied and Computational Harmonic Analysis, 10, pp. 93-98,2001.
[8] A.R. Calderbank, I. Daubechies, W. Sweldens, and B.L. Yeo. “Wavelet transforms that map integers to integers,”. Appl. Comp. Harm. Anal., 5 (3), pp. 332-369,1998.
[9] Shannon, C. E., “Communication Theory of Secrecy Systems, ”Bell System Technical Jo urnal, Vol. 28, 1949, pp. 656–715.
[10] Dr. Jameel Ahmed, “Transform-Domain and DSP Based Secure Speech Communication”. Ph.D. dissertation, Hamdard Institute of Information Technology, 2007.
[11] D.J.H. Garling, D. Gorenstein, T. Tom Dieck, P. Walters, "WAVELETS AND OPERATORS,", Cambridge University Press 1992
[12] Tuan Van Pham, "Wavelet Analysis for Robust Speech Processing and Applications," VDM Verlag, Germany, 2008.
[13] StephaneMallat, "A Wavelet Tour of Signal Processing," Elsevier, 1999.
[14] Richard E. Blahut, "Fast Algorithms for Signal Processing," CAMBRIDGE UNIVERSITY PRESS, 2010.
[15] John J. Benedetto, "Applied and Numerical Harmonic Analysis: Frames and Bases,” Birkha¨user Boston, 2008.
[16] Mladen Victor W. ,"Adapted Wavelet Analysis from Theory to Software," A K Peters,Ltd 1994.
[17] Michel Misiti, Yves Misiti, Georges Oppenheim, Jean-Michel Poggi "Wavelet Toolbox For Use with MATLAB ®," The MathWorks, Inc, 2002.
[18] Alfred Mertins, "Signal Analysis: Wavelets, Filter Banks, Time-Frequency Transforms and Applications,",Mertins, Signaltheorie, 1996.
[19] Ali N. Akansu, Michael J. Medley, "WAVELET, SUBBAND AND BLOCK TRANSFORMS IN COMMUNICATIONS AND MULTIMEDIA," Kluwer Academic / Plenum Publishers, New York, 2002.
[20] A.Jensen, A.la Cour-Harbo, "Ripples in Mathematics The Discrete Wavelet Transform,", Springer.Verlag Berlin Heidelberg 2001.
[21] CHARLESK.CHUI, "An Introduction to Wavelets,", Academic Press 1992.
[22] C. Sidney Burrus, Ramesh A. Gopinath, and .HaitaoGuo, "Introduction to Wavelets and Wavelet Transforms," Prentice-Hall, Inc., 1998.
[23] "Wavelets and Multiscale Analysis Theory and Applications,"SpringerScience+Business Media, LLC, 2011.
Cite This Article
  • APA Style

    Laith Ali Abdul-Rahaim, Ammar Abdulrasool Muneer. (2015). Design of Secure Ad Hoc Network Using Three Dimensional Discrete Wavelet Transformation Based on Performance Enhancement. American Journal of Networks and Communications, 4(3-1), 35-44. https://doi.org/10.11648/j.ajnc.s.2015040301.17

    Copy | Download

    ACS Style

    Laith Ali Abdul-Rahaim; Ammar Abdulrasool Muneer. Design of Secure Ad Hoc Network Using Three Dimensional Discrete Wavelet Transformation Based on Performance Enhancement. Am. J. Netw. Commun. 2015, 4(3-1), 35-44. doi: 10.11648/j.ajnc.s.2015040301.17

    Copy | Download

    AMA Style

    Laith Ali Abdul-Rahaim, Ammar Abdulrasool Muneer. Design of Secure Ad Hoc Network Using Three Dimensional Discrete Wavelet Transformation Based on Performance Enhancement. Am J Netw Commun. 2015;4(3-1):35-44. doi: 10.11648/j.ajnc.s.2015040301.17

    Copy | Download

  • @article{10.11648/j.ajnc.s.2015040301.17,
      author = {Laith Ali Abdul-Rahaim and Ammar Abdulrasool Muneer},
      title = {Design of Secure Ad Hoc Network Using Three Dimensional Discrete Wavelet Transformation Based on Performance Enhancement},
      journal = {American Journal of Networks and Communications},
      volume = {4},
      number = {3-1},
      pages = {35-44},
      doi = {10.11648/j.ajnc.s.2015040301.17},
      url = {https://doi.org/10.11648/j.ajnc.s.2015040301.17},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajnc.s.2015040301.17},
      abstract = {This work shows new and efficient algorithm of cryptographic purpose based symmetric and conventional techniques that considers the representation of the cipher text by using the three dimensional Discrete Wavelet Transform to find the wavelet decomposition vector containing the approximation and the detail coefficients then build the three dimensional data structure approach. The decryption is done by extracting the encrypted data from the wavelet decomposition vector using the algorithm of inverse Discrete Wavelet Transformation. The encrypted message consists the wavelet decomposition vector. The key is used for authorization purpose to access the network. Results shows great data security and BER over wireless channels based Ad Hoc network.},
     year = {2015}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Design of Secure Ad Hoc Network Using Three Dimensional Discrete Wavelet Transformation Based on Performance Enhancement
    AU  - Laith Ali Abdul-Rahaim
    AU  - Ammar Abdulrasool Muneer
    Y1  - 2015/01/22
    PY  - 2015
    N1  - https://doi.org/10.11648/j.ajnc.s.2015040301.17
    DO  - 10.11648/j.ajnc.s.2015040301.17
    T2  - American Journal of Networks and Communications
    JF  - American Journal of Networks and Communications
    JO  - American Journal of Networks and Communications
    SP  - 35
    EP  - 44
    PB  - Science Publishing Group
    SN  - 2326-8964
    UR  - https://doi.org/10.11648/j.ajnc.s.2015040301.17
    AB  - This work shows new and efficient algorithm of cryptographic purpose based symmetric and conventional techniques that considers the representation of the cipher text by using the three dimensional Discrete Wavelet Transform to find the wavelet decomposition vector containing the approximation and the detail coefficients then build the three dimensional data structure approach. The decryption is done by extracting the encrypted data from the wavelet decomposition vector using the algorithm of inverse Discrete Wavelet Transformation. The encrypted message consists the wavelet decomposition vector. The key is used for authorization purpose to access the network. Results shows great data security and BER over wireless channels based Ad Hoc network.
    VL  - 4
    IS  - 3-1
    ER  - 

    Copy | Download

Author Information
  • Department of Electrical Engineering, University of Babylon, Babil, Iraq

  • Department of Electrical Engineering, University of Babylon, Babil, Iraq

  • Sections