Secured Bluetooth Authentication Using Artificial Neural Networks

Abstract

Authentication in wireless networking is a mechanism to proof identities and avoid masking. The use of wireless devices and technology has made rapid growth in the market. In all such devices, user authentication is done once and is considered authentic forever until it is revoked by the user. We present a model of authentication, where a Bluetooth enabled mobile phone and laptop is taken. In the present paper, we simulate the connection between artificial intelligence and cryptography. We take the help of a pattern recognition technique of the Back Propagation Algorithm of Neural Network to store the encrypted password as used in any of such devices. In the proposed mechanism the encrypted password is stored as network parameters. Since reverse tracking from weight matrices is a difficult task, such systems become impossible to crack.

Authors and Affiliations

Menal Dahiya, Sumeet Gill

Keywords

Related Articles

Wireless real time health monitoring system built with FPGA and RF networks

In recent Days, heart disease is a major concern in the health indicator for the elderly. Cardiovascular diseases are always the leading cause of death in many countries. Due to the rapid growth of elderly population...

Transportation XSS Model Data Escape Finding In Content Delivery Networks

Recently increasing use of multimedia scheme applications and services the applications is trusted video sources to dentations undesirable content-loss become critical. While preserving user security XSS model is use...

A Novel Approach in Data Clustering using Population Based Optimization Algorithm to solve Economic Load Dispatch Problem

Computing the global optima of a functional has been extensively applied in a wide range of engineering applications. Nevertheless, it is well known they usually lack of effectiveness when dealing with complex nonline...

Financial Markets Prediction Using Quantitative Analysis (FMPQA)

Unlimited trade pressures forced the fiscal security organizations to explore the possibilities of information technology with the support of data mining technique. Now a days unbiased volume of trades in the markets...

Multiple View Point on Cluster Analysis

The clustering methods have to assume some cluster relationship among the data objects that they are applies on. Similarity between a pair of objects can be defines either explicitly or implicitly. In this paper we i...

Download PDF file
  • EP ID EP28420
  • DOI -
  • Views 320
  • Downloads 7

How To Cite

Menal Dahiya, Sumeet Gill (2016). Secured Bluetooth Authentication Using Artificial Neural Networks. International Journal of Research in Computer and Communication Technology, 5(5), -. https://europub.co.uk/articles/-A-28420