Mobile-to-Mobile Communication using Secured Shared Key
Journal Title: Engineering and Scientific International Journal - Year 2018, Vol 5, Issue 1
Abstract
In mobile networking, Mobile-to-Mobile communication helps in data exchange between actual and closest devices. The Mobile-to-Mobile communications are used to make short range communication. It improves the network performance and supports proximity based services. Our primary goal is to provide potential solution to mobile-to-mobile communications. In this paper we use an efficient key agreement protocol known as Diffie- Hellman key and commitment scheme. The proposed protocol has less computation and communication cost, while compared to other protocols.
Authors and Affiliations
Gopakumar G. S.
A Comparative Study of Bacterial and Fungal Flora in Glucose Fermentation
Microbes can be used as efficient live factories to produce beneficial products. They are cheap resources that consist of numerous enzymes which can convert complex chemical structure into simple digestible molecules wit...
Cow Dung for Increasing the Ph of Acidic Soil and Cow Importance from Vedic Scriptures
Now a day‟s pollution is increasing rapidly whether it is related to land or it is related to soil, water and air. This is due to increase in industrial activities in which some industries releases their waste without tr...
A Novel Protocol for Packet Arrivals in DTNs
Delay tolerant Networks (DTNs) is an approach to network architecture which will targets the heterogeneous network. Delay tolerant network may will deals with mobile nodes even the mobile nodes don’t have...
Status of Ground water Quality in Identified Areas of Karwi City, Utter Pradesh, India
Ground water is the primary source of water for human consumption, as well as for agricultural and industrial uses in many regions all over the world. District Chitrakoot lies between Lat. 24048′ to 25012′ N and Lang. 80...
Cross Layer Intrusion Detection System in WSNs using Self Rejuvenating Module
The Wireless Sensor Networks (WSN) had been inferior to different attacks at different layers of the union stack. So that the rare intrusion detection systems (IDS) has been projected to act the WSNs. But routinely told...