Procedure To Establish A Secure Self-Configured Environment For Data Distribution And Services Sharing Among Users

Abstract

A spontaneous network is a particular case of ad hocnetworks. They usually have little or no dependence on acentralized administration. Spontaneous networks can bewired or wireless. We regard as only wireless spontaneousnetworks in this paper. Their objective is the integration of services and devices in the same environment enabling theuser to have instant service without any external infrastructure.Because these networks are implemented indevices such as laptops, PDAs or mobile phones withlimited capacities they must use a lightweight protocol andnew methods to control manage and integrate them. To resolve mentioned securityissues we used an authentication phase and a trust phase. Moreover we presented a method to allow nodesto check the legitimacy of their IP addresses while notgenerating duplicated IP addresses. The mechanism helpsnodes to authenticate by using their IP addresses. We haveused this mechanism in the secure protocol presented inthis paper.

Authors and Affiliations

Syam Kumar Nallamothu| Dept. of CSE, Nimra Institute of Science & Technology, Vijayawada, AP, India, Amanatulla Mohammad| Dept. of CSE, Nimra Institute of Science & Technology, Vijayawada, AP, India, Sayeed Yasin| Dept. of CSE, Nimra Institute of Science & Technology, Vijayawada, AP, India

Keywords

Related Articles

Combustion Analysis on HCCI Engine By Using Blended Fuel With Varying Injection Timing Of PCCI

There are two sorts of inside burning motors in particular the sparkle ignition (SI) and the pressure ignition (CI). Petrol and diesel are at present rule powers for SI and CI motors. These energizes are very nearly...

Design And Analysis Of Machining (Hydraulic) Fixture For AVTEC Transmission Case Component

In order to have interchangeable parts in mass production, jigs and fixtures play a vital role in manufacturing process. A fixture is a special tool designed for specific purpose and for specific component for operat...

Confidential Data with Safeguard Access Control in distributed Cloud Computing

Cloud computing is a safeguard technology which means that privileging permissions for the users and stowing of data on world wide web. Mainly cloud computing focus on Protection and mystery represent major concerns...

Dynamic Performance Analysis of BLDC Motor with Adaptive Neuro Fuzzy Controller Under Critical Load Condition

Brushless DC (BLDC) motors have been widely used in many fields of drives for their high power/weight, high torque, high efficiency, long operating life, noiseless operation, high speed ranges and ease of control. In...

Enhanced Protection for Multi-axle Vehicles

The world is flourishing with new innovation in the field of science and technologies. We are very proud of this technical growth. It’s become true, but sometimes these technologies are misused for destructions. Th...

Download PDF file
  • EP ID EP16469
  • DOI -
  • Views 365
  • Downloads 24

How To Cite

Syam Kumar Nallamothu, Amanatulla Mohammad, Sayeed Yasin (2015). Procedure To Establish A Secure Self-Configured Environment For Data Distribution And Services Sharing Among Users. International Journal of Science Engineering and Advance Technology, 3(2), 44-46. https://europub.co.uk/articles/-A-16469