Secure Data transmission using Li-Fi : By Rivest Cipher4 and Jumbled Word String Encryption Decryption Algorithm

Authors

  • Charu Upadhyay  Department of Computer Science Engineering, Swami Keshvanand Institute of Technology, Management and Gramothan, Jaipur, Rajasthan, India
  • Sushila Vishnoi  Department of Computer Science Engineering, Swami Keshvanand Institute of Technology, Management and Gramothan, Jaipur, Rajasthan, India
  • Neha Janu  Department of Computer Science Engineering, Swami Keshvanand Institute of Technology, Management and Gramothan, Jaipur, Rajasthan, India

Keywords:

Light Fidelity, Wireless Fidelity, Security Key, Encryption and Decryption Technique, Virtual Light Communication.

Abstract

Light-Fidelity is the innovation which bolsters transmission of information through light. Different methods are utilized for encryption and decoding to help exceptionally anchor information transmission. In this paper, method for correspondence is utilized which underpins anchored information transmission utilizing Rivest Cipher 4 calculation alongside Jumbled Word String Encryption Decryption procedure at the sender's side. Muddled Word String Encryption Decryption is Jumbled Word String Encryption Decryption system. Information is sent through Light-Fidelity from sender to recipient in the wake of playing out its encryption. Muddled Word String Encryption Decryption calculation gives security while information is transmitted among Light-Fidelity gadgets. Information is contribution from the client. It is encoded utilizing Rivest Cipher 4 calculation. After this, Jumbled Word String Encryption Decryption calculation is connected which gives greater security to scrambled content. At that point, information is sent through the channel by means of Light-Fidelity implies. On the other framework at recipient side, plain information is repeated by applying methods for unscrambling i.e. switch of procedures connected for encryption at transmitter end. Information security is essential worry in this day and age which is tended to flawlessly utilizing system portrayed in paper.

References

  1. Megha Goyal1, Dimple Saproo2, Asha Bhagashra3,"New Epoch of wireless communication: Light Fidelity" IJIRCCE, vol 1, issue 2, April 2013.
  2. J.K. and E.F. Schubert, Transcending the replacement paradigm of solid-state lighting,‖ Opt. Exp., vol. 16, no. 26, pp. 21835-21 837, Dec. 2008.
  3. H. Haas, "Wireless data from every light bulb". TED Global.Edinburgh, Scotland, July 2011.
  4. "Visible-light communication: Tripping the light fantastic: A fast and cheap optical version of Wi-Fi is coming", Economist, dated 28Jan 2012 .International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 16 (2014), pp
  5. Li-Fi, Internet at speed of light - gadgeteer.com/2011/08/29 Li-Fi- internet-at-the speed- of - light
  6. Revathiganesan, (2014) Li-Fi technology in wireless communication , international journal &magazine of engineering, technology, management and research, issn no: 2348-4845.
  7. http://www.lifi-lab.com/lifi/lifi-enhanced-mode-future-wireless-communication-review.html
  8. An article on LI-FI appeared in The Economist (Jan 28th 2012): Visible-light Communication: Tripping the light fantastic - http://www.economist.com/node/21543470

Downloads

Published

2018-09-30

Issue

Section

Research Articles

How to Cite

[1]
Charu Upadhyay, Sushila Vishnoi, Neha Janu, " Secure Data transmission using Li-Fi : By Rivest Cipher4 and Jumbled Word String Encryption Decryption Algorithm, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 7, pp.199-204, September-October-2018.