<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>saujs</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Sakarya University Journal of Science</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2147-835X</issn>
                                                                                            <publisher>
                    <publisher-name>Sakarya University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.16984/saufenbilder.506554</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Computer Software</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Bilgisayar Yazılımı</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>Encrypted Data Transmission Model For Ethernet LANs</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-8902-0934</contrib-id>
                                                                <name>
                                    <surname>Koçak</surname>
                                    <given-names>Cemal</given-names>
                                </name>
                                                                    <aff>Gazı University</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-9611-9588</contrib-id>
                                                                <name>
                                    <surname>Durak</surname>
                                    <given-names>Murat</given-names>
                                </name>
                                                                    <aff>Gazı University</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20190801">
                    <day>08</day>
                    <month>01</month>
                    <year>2019</year>
                </pub-date>
                                        <volume>23</volume>
                                        <issue>4</issue>
                                        <fpage>641</fpage>
                                        <lpage>649</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20190102">
                        <day>01</day>
                        <month>02</month>
                        <year>2019</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20190214">
                        <day>02</day>
                        <month>14</month>
                        <year>2019</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 1997, Sakarya University Journal of Science</copyright-statement>
                    <copyright-year>1997</copyright-year>
                    <copyright-holder>Sakarya University Journal of Science</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>Despite many research and development efforts in the field of datacommunication security, the security of the local area network (LAN&#039;s) is stillnot fully resolved. In this work, we proposed a model of encryption of the datafield in the Ethernet frame to create secure Ethernet LANs. In this model, thedata field in the Ethernet frame is encrypted and sent to the destination. The1500-byte data field, defined as the standard for the Ethernet frame, isdivided into 1497 bytes as the field used for the data. The remaining 2-bytesare defined as Message Body Length (MBL) and 1-byte as Message Number (MN). Themessage number is used to verify the encrypted data and the MBL is used for thelength of the message. The proposed model provides secure data communicationover Ethernet local area networks. With this model, safe data communication isprovided on the Ethernet LAN. Even if attackers obtain the packet at the timeof communication, the encrypted message is difficult to decipher.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Ethernet networks</kwd>
                                                    <kwd>  Ethernet frame</kwd>
                                                    <kwd>  encrypted data transmission</kwd>
                                                    <kwd>  winpcap</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	A.Pérez-Resa, et al., “Using a Chaotic Cipher to Encrypt Ethernet Traffic,” In Circuits and Systems (ISCAS), 2018 IEEE International Symposium on, 1-5, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	T. Kiravuo, et al., “A Survey of Ethernet LAN Security,” In IEEE Communications Surveys &amp; Tutorials, vol. 15, no. 3, 1477-1491, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	IEEE Standard for Ethernet, IEEE Std., Rev. IEEE Std. 802.3-2015 (Revision of IEEE Std. 802.3-2012), Mar. 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	J. Postel, J. Reynolds, “A Standard for the Transmission of IP Datagrams over IEEE 802 Networks,” RFC 1042, 1988.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	IEEE, &quot;IEEE Standards for Local Area Networks: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications,&quot; IEEE, New York, 1985.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	IEEE, &quot;IEEE Standards for Local Area Networks: Token-Passing Bus Access Method and Physical Layer Specification,&quot; IEEE, New York, 1985.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	IEEE, &quot;IEEE Standards for Local Area Networks: Token Ring Access Method and Physical Layer Specifications,&quot; IEEE, New York, 1985.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	IEEE, &quot;IEEE Standards for Local Area Networks: Logical Link Control&quot;, IEEE, New York, 1985.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9] 	Cisco Systems, &quot;Cisco Global Cloud Index: Forecast and Methodology 2015-2020,&quot; 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10] 	K. F. Wahid, “Rethinking the link security approach to manage large-scale Ethernet network,” In Local and Metropolitan Area Networks (LANMAN), 17th IEEE Workshop on, 1-6, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	R. Khoussainov, A. Patel,” LAN security: problems and solutions for Ethernet networks,” Computer Standards &amp; Interfaces, Vol. 22, no. 3, 191-202, 2000.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12] 	N. Hadjina, P. Thompson,” Data security on Ethernet LANs,” 10th Mediterranean Electrotechnical Conference. Information Technology and Electrotechnology for the Mediterranean Countries Proceedings. MeleCon 2000 (Cat. No.00CH37099), Lemesos, vol.1, 23-26, 2000.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13] 	A. Pérez-Resa, et al., “Using a Chaotic Cipher to Encrypt Ethernet Traffic,” In Circuits and Systems (ISCAS), 2018 IEEE International Symposium on, 1-5, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	G.  King, “A survey of commercially available secure LAN products,” In Computer Security Applications Conference, Fifth Annual, 239–247, 1989.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	R. Housley, “Encapsulation security protocol design for local area networks,” In Local Area Network Security. Lecture Notes in Computer Science, T. Berson and T. Beth, Eds. Springer Berlin Heidelberg, vol. 396, ch. 10, 103–109, 1989.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	F. Poon, M. Iqbal, “Design of a physical layer security mechanism for CSMA/CD networks,” Communications, Speech and Vision, IEE Proceedings I, vol. 139, no. 1, 103–112, 1992.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	M. Soriano, et al., “A particular solution to provide secure communications in an Ethernet environment,” In CCS’93: Proc. 1st ACM conference on Computer and communications security, NY, USA: ACM Press, 17–25, 1993.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	M. El-Hadidi, et al., “Implementation of a hybrid encryption scheme for Ethernet,” In Computers and Communications, Proceedings. IEEE Symposium on. IEEE Comput. Soc. Press, 150–156, 1995.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19] 	G. E. Pake, “Research at Xerox PARC: A Founder&#039;s Assessment,” IEEE Spectrum, vol. 22, no. 10, 54-61, 1985.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20]	R. M. Metcalfe, “Computer/network interface design: Lessons from Arpanet and Ethernet,” IEEE Journal on Selected Areas in Communications, vol.11, no. 2, 173-180, 1993.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21]	 &quot;802.3-2012 – IEEE Standard for Ethernet&quot; (PDF). ieee.org. IEEE Standards Association. 2012-12-28.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22] 	M. Khan, M. Ayyoob, “Computer Security in the Human Life,” International Journal of Computer Science and Engineering (IJCSE), vol. 6, no. 1, 35-42, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23]	A. Zúquete, et al., “Packet tagging system for enhanced traffic profiling,” In Internet Multimedia Systems Architecture and Application (IMSAA), 2011 IEEE 5th International Conference on, 1-6, 2011.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24] 	L. Heberlein, et al., “A network security monitor,” In Research in Security and Privacy, Proceedings, IEEE Computer Society Symposium on. IEEE, 296-304, 1990.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25] 	J. Akram et al., “Future and Techniques of Implementing Security in VLAN,” Journal of Network Communications and Emerging Technologies (JNCET), vol. 7, no. 5, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">[26] 	A. Mehdizadeha, et al., “Virtual Local Area Network (VLAN): Segmentation and Security,” In The Third International Conference on Computing Technology and Information Management (ICCTIM2017), 78-89, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">[27]	S. Lin, et al., “A design of the ethernet firewall based on FPGA,” In Image and Signal Processing, Biomedical Engineering and Informatics (CISP-BMEI), 10th International Congress on IEEE, 1-5, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">[28]	S. Yonghong, et al., “Design of Security Gateway Based On Dual-Homed Architecture,” International Conference on Robots &amp; Intelligent System, 159- 163, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">[29] 	A. Pérez-Resa, et al., “Using a Chaotic Cipher to Encrypt Ethernet Traffic,” In Circuits and Systems (ISCAS), International Symposium on IEEE, 1-5, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">[30]	A. Yin, S. Wang, “A novel encryption scheme based on timestamp in gigabit Ethernet passive optical network using AES-128,” Optik-International Journal for Light and Electron Optics, vol. 125, no. 3, 1361-1365, 2014.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">[31]	D. Pawar, “Survey on network based cryptographic techniques for key generation and data Encryption/Decryption,” International Research Journal of Engineering and Technology (IRJET), vol. 4, no. 5, 1361-1363, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">[32]	R. Karmakar, et al., “Enhancing security of logic encryption using embedded key generation unit,” In Test Conference in Asia (ITC-Asia), International IEEE, 131-136, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">[33] 	M. Durak, &quot;Ethernet ağlarda güvenli veri iletişimi,&quot; Gazi University Faculty of Technology Computer Engineering graduation thesis, 2018.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
