Authors
ZT Abdul-Mehdi
B Byamba
M. M. N. Hamarsheh
Pages From
140
Pages To
149
Journal Name
International Journal of Computer Science and Network Security
Volume
8
Issue
6
Keywords
Data network security, Data transmission security, Hybrid cryptography, Authentication, Comparison
Abstract

In this paper work is related with security model for the Multi Check-out Timestamp Order (MCTO) data
transaction. By research, weakness of the MCTO is determined and considered as security risk involved with data transmission over the wireless network. Since the research focused on this vulnerability, it has explored regarding with a suitable security transmission management system to the MCTO data transaction. During the research, a fully secure transmission model is found and designed. This paper discuss about the security model, which is based on a hybrid cryptography system, is used to encrypt and decrypt data for the security transmission between Base Station (BS) and Mobile Host (MH)for the MCTO model