Mobile-to-Mobile Communication using Secured Shared Key

Journal Title: Engineering and Scientific International Journal - Year 2018, Vol 5, Issue 1

Abstract

In mobile networking, Mobile-to-Mobile communication helps in data exchange between actual and closest devices. The Mobile-to-Mobile communications are used to make short range communication. It improves the network performance and supports proximity based services. Our primary goal is to provide potential solution to mobile-to-mobile communications. In this paper we use an efficient key agreement protocol known as Diffie- Hellman key and commitment scheme. The proposed protocol has less computation and communication cost, while compared to other protocols.

Authors and Affiliations

Gopakumar G. S.

Keywords

Related Articles

Analyzing Download time Performance of University Websites in India

The download time of website depends on various web components such as multimedia size, document size, program size and so on. The main objective of this paper is to Analyze Download time of University Websites in India...

Cow Dung for Reducing Aluminium Toxicity in Soil and Cow Importance from Vedic Scriptures

Aluminium is third most abundant element present in earth crust and if suppose it‟s concentration increases in soil and water than it affects plant root in which aluminium concentration is high and also if in water it co...

Mobile-to-Mobile Communication using Secured Shared Key

In mobile networking, Mobile-to-Mobile communication helps in data exchange between actual and closest devices. The Mobile-to-Mobile communications are used to make short range communication. It improves the network perf...

Resource Allocation of Efficient Energy in OFDM Systems using Distributed Antennas

We develop an energy-efficient resourceallocation scheme with proportional fairness for downlink multiuser orthogonal frequency-division multiplexing (OFDM) systems with distributed antennas. Our aim is to maximize energ...

Improving Iris Performance using Segmentation with CASIA Database

We can recognize humans each other according to their numerous characteristics of age. Identity verification (authentication) in computer systems has been traditionally based on something like password, key, card, pin an...

Download PDF file
  • EP ID EP631312
  • DOI -
  • Views 202
  • Downloads 0

How To Cite

Gopakumar G. S. (2018). Mobile-to-Mobile Communication using Secured Shared Key. Engineering and Scientific International Journal, 5(1), 9-11. https://europub.co.uk/articles/-A-631312