Announcement iconContinuing Accepting Applications for Admission !!
for the Spring Semester of the Academic Year 2019/2020

Security Model for the MCTO Data Transaction Management

Authors: 
ZT Abdul-Mehdi
B Byamba
M. M. N. Hamarsheh
Journal Name: 
International Journal of Computer Science and Network Security
Volume: 
8
Issue: 
6
Pages From: 
140
To: 
149
Date: 
Sunday, June 1, 2008
Keywords: 
Data network security, Data transmission security, Hybrid cryptography, Authentication, Comparison
Abstract: 
In this paper work is related with security model for the Multi Check-out Timestamp Order (MCTO) data transaction. By research, weakness of the MCTO is determined and considered as security risk involved with data transmission over the wireless network. Since the research focused on this vulnerability, it has explored regarding with a suitable security transmission management system to the MCTO data transaction. During the research, a fully secure transmission model is found and designed. This paper discuss about the security model, which is based on a hybrid cryptography system, is used to encrypt and decrypt data for the security transmission between Base Station (BS) and Mobile Host (MH)for the MCTO model