Information Transmission Security

Information Transmission Security

Manjunath Ramachandra (MSR School of Advanced Studies, Philips, India)
DOI: 10.4018/978-1-60566-888-8.ch021
OnDemand PDF Download:
No Current Special Offers


The data transactions over a web based supply chain are prone to security threats as the internet is involved all the way. The internet happens to be an open forum easily accessible to the general public. It is quite possible that the data gets hacked or faked resulting in financial losses. Worse, it may not reach the intended recipient at all, defeating the purpose of the usage of the web. However, it should not be a cause of concern. With appropriate pre processing of the information getting uploaded on to the web, it should be possible to see that the data does not fall in to the wrong hands and reaches the intended recipients. The required tools and techniques are introduced in this chapter.
Chapter Preview


Transmission security (Schneier, Bruce, 2000). is the ability to send data from one computer system to another computer system so that only the intended recipient gets the data. In addition, the data received has to be identical to the data sent. Transmission security gets implemented through secure networks. Any attempt by the intruder to intercept the data stream (Bishop, Matt, 2003) over a fiber through tapping can be more easily detected than a tap into the copper wire. This is because the tap in to fiber damages the network and alters the topology that can be easily detected. The intrusion of data over a physical medium is shown in figure 1. On the other hand, detection of an intrusion that takes place over the air would be nearly impossible.

Figure 1.

Intrusion of data over physical medium


The security components involved in the transfer of data consists of (Gollmann, Dieter, 1999):

  • Authentication: The authentication is required to prove the identity of the client and the server.

  • Authorization: Based on the identity of the client, authorization will be provided to access the data and the applications.

  • Encryption: After the authorization is provided, data transfer happens in encrypted form.

Complete Chapter List

Search this Book: