DEVELOPING A SECURITY PROTOCOL FOR A WIRELESS COMPUTER VIRTUAL LABORATORY (WCVLAB)

Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 6

Abstract

For a Virtual Computer Laboratory (VCLAB) to operate effectively within a Wireless intranet setup, a lot of protocols are employed to function. This write-up is aimed at developing a protocol to secure a Wireless Computer Virtual Laboratory (WCVLAB) of any institution. The protocol developed secures a Wireless Computer Virtual Laboratory through an authentication server by supplying authentication parameters at registration, which will be stored to be used at login for comparison. Fingerprint is used to ensure that a user is who he or she claims to be. Duration for access is allotted for a user, after which initial parameters will be supplied for re-authentication. While a user is still logged-on, security questions will be posed intermittently to avoid spoofing. The methodology used for this research is Structured System Analysis and Design. Java Programming Language is used for coding the program and MySQL is the database tool. The result of the implemented system is a secured protocol that guarantees secured access. This is different from the security of other Computer Virtual Laboratory which uses only users name, pin or registration number.

Authors and Affiliations

EDWARD N. UDO , IMO J. EYO , INI J. UMOEKA

Keywords

Related Articles

An Approach with Maintainability, Structured Design and Automation with the Intension of Software Engineering

Scientific software must be personalized for dissimilar execution environments, problem sets, and existing resources to make sure its competence and consistency. Even though adaptation patterns be able to be found in a e...

ENGLISH ALPHABET RECOGNITION USING CHAIN CODE AND LCS

Since several decades OCR system is getting more and more useful in daily life for various purposes. Many researches have been done on many types of characters by using different approaches. However very little investiga...

JAMM SCHEDULING: A MORE EFFICIENT APPROACH

Scheduling involves the allocation of resources and time to tasks in such a way that certain performance requirements are met. CPU scheduling is the mechanisms of selecting a process among various processes and allocate...

THE MAIN FEATURE FOR SUCCESSFUL IMPLEMENTATION A DATA WAREHOUSE

Data warehousing is the leading and most reliable technology used today by companies for planning, forecasting, and management A lot has been done in this field regarding design and development of data warehouses and a l...

LIGHT WEIGHT SECURITY AND AUTHENTICATION IN WIRELESS BODY AREA NETWORK

In recent year, the increasing number of wearable sensors on human can serve for many purposes like emergency care, health care remote monitoring, personal entertainment and communication etc. The healthcare application...

Download PDF file
  • EP ID EP134874
  • DOI -
  • Views 117
  • Downloads 0

How To Cite

EDWARD N. UDO, IMO J. EYO, INI J. UMOEKA (2011). DEVELOPING A SECURITY PROTOCOL FOR A WIRELESS COMPUTER VIRTUAL LABORATORY (WCVLAB). Indian Journal of Computer Science and Engineering, 2(6), 957-965. https://europub.co.uk/articles/-A-134874