首页    期刊浏览 2024年11月14日 星期四
登录注册

文章基本信息

  • 标题:ACHIEVING DATA AUTHENTICATION WITH HMAC-SHA256 ALGORITHM
  • 本地全文:下载
  • 作者:Nureni Ayofe AZEEZ
  • 期刊名称:Computer Sciences and Telecommunications
  • 印刷版ISSN:1512-1232
  • 出版年度:2018
  • 卷号:54
  • 期号:2
  • 页码:34-43
  • 出版社:Internet Academy
  • 摘要:Security and privacy of information being shared seamlessly in a distributed environment is very important. Failure to put in place, appropriate safety measure will give room for vulnerability. In order to ensure a secured information-sharing environment therefore, Keyed-Hash Message Authentication Code and Secured Hash Algorithm 256, HMAC-SHA256 was implemented. A Trust Based system that identifies the malicious nodes in the network and differentiates them from trusted nodes was also introduced. The trust value of the participating nodes is increased only for every successful transmission and decreased for those nodes that do not send the data towards the desired destination. The HMAC-SHA256 algorithm, which provided the desired results was implemented with Java programming language, HTML and CSS.
  • 关键词:Network Security; Keyed_Hash_Message_Authentication_Code (HMAC); Malicious Nodes; Trusted Nodes; SHA-256
国家哲学社会科学文献中心版权所有