A Proposed Paper for D-Scrabble Physical Layer Security Model Integrated with AI
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 122 , Downloads: 102 | CTR: 84 % | Weekly Popularity: ⮙2

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016

A Proposed Paper for D-Scrabble Physical Layer Security Model Integrated with AI

Devansh Dave

This paper proposes a new model for enhancing physical layer security. In todays world, cryptography and encryption algorithms like RSA and Diffie-Hellman can be broken down by high computation capability of computers. Inclusion of security in physical layer will greatly reduce the problem of eavesdropping and wiretapping. The main idea is to prevent security attacks from its root itself. The strength of any encryption algorithm or security model lies in its nature of unpredictability and adaptability. This paper puts forth idea of integrating AI with physical layer security. Humans way of thinking is the most unpredictable pattern. Scrabble, a puzzle word game, is used to humanize the D-Scrabble model and thus introduce a strong security model with great level of unpredictability. A new method called cycling technique is also introduced in this paper. This model also uses a new technology, NEAT- NeuroEvolution of Augmenting Technologies.

Keywords: NEAT- NeuroEvolution of Augmenting Technologies, Scrabble, AI, Physical layer security, encryption, Security with AI

Edition: Volume 5 Issue 3, March 2016

Pages: 1885 - 1890

Share this Article

How to Cite this Article?

Devansh Dave, "A Proposed Paper for D-Scrabble Physical Layer Security Model Integrated with AI", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV162313, Volume 5 Issue 3, March 2016, 1885 - 1890

122 PDF Views | 102 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'AI'

Views: 200 , Downloads: 123 | CTR: 62 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Views: 1400 , Downloads: 449 | CTR: 32 % | Weekly Popularity: ⮙28

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Views: 209 , Downloads: 153 | CTR: 73 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Views: 151 , Downloads: 103 | CTR: 68 %

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Views: 117 , Downloads: 82 | CTR: 70 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'encryption'

Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article
Top