Secured Bluetooth Authentication Using Artificial Neural Networks

Abstract

Authentication in wireless networking is a mechanism to proof identities and avoid masking. The use of wireless devices and technology has made rapid growth in the market. In all such devices, user authentication is done once and is considered authentic forever until it is revoked by the user. We present a model of authentication, where a Bluetooth enabled mobile phone and laptop is taken. In the present paper, we simulate the connection between artificial intelligence and cryptography. We take the help of a pattern recognition technique of the Back Propagation Algorithm of Neural Network to store the encrypted password as used in any of such devices. In the proposed mechanism the encrypted password is stored as network parameters. Since reverse tracking from weight matrices is a difficult task, such systems become impossible to crack.

Authors and Affiliations

Menal Dahiya, Sumeet Gill

Keywords

Related Articles

New Software Testing Methodologies for Regulation Needs

Software Testing is modifying activity different software engineering projects, especially for large security models. The new tests cases can uses some hundred to several thousands. It significant computing locations...

Performance Comparison on Power Efficient Ad hoc Routing Protocol

Basically ad hoc mobile devices operate on batteries. Hence, power consumption becomes an Important issue for the researcher. To maximize the lifetime of ad hoc mobile networks, the power consumption rate of each node...

Requirement Elicitation in Web Applications: Challenges

Requirement elicitation is a vital activity in the process of requirement development and it discovers the requirements of end users. The successfulness of this process mainly depends on identifying the appropriate s...

Speech Recognition in Marathi Language on Android O.S.

Speech is the basic mode of communication among human beings. For about four decades human beings have been dreaming of an ”intelligent machine” which can master the natural speech. Speech recognition is the process...

SELECTIVE JAMMING ATTACKS PREVENTION SCHEMES IN WIRELESS NETWORKS USING COMBINED CRYPTOGRAPHIC PRIMITIVES

The open nature of the wireless average greeneries it susceptible to intended interfering attacks, typically referred to as blocking. This intended interfering with wireless transmissions can be used as a Launch pad...

Download PDF file
  • EP ID EP28420
  • DOI -
  • Views 319
  • Downloads 7

How To Cite

Menal Dahiya, Sumeet Gill (2016). Secured Bluetooth Authentication Using Artificial Neural Networks. International Journal of Research in Computer and Communication Technology, 5(5), -. https://europub.co.uk/articles/-A-28420