Secured Bluetooth Authentication Using Artificial Neural Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 5
Abstract
Authentication in wireless networking is a mechanism to proof identities and avoid masking. The use of wireless devices and technology has made rapid growth in the market. In all such devices, user authentication is done once and is considered authentic forever until it is revoked by the user. We present a model of authentication, where a Bluetooth enabled mobile phone and laptop is taken. In the present paper, we simulate the connection between artificial intelligence and cryptography. We take the help of a pattern recognition technique of the Back Propagation Algorithm of Neural Network to store the encrypted password as used in any of such devices. In the proposed mechanism the encrypted password is stored as network parameters. Since reverse tracking from weight matrices is a difficult task, such systems become impossible to crack.
Authors and Affiliations
Menal Dahiya, Sumeet Gill
New Software Testing Methodologies for Regulation Needs
Software Testing is modifying activity different software engineering projects, especially for large security models. The new tests cases can uses some hundred to several thousands. It significant computing locations...
Performance Comparison on Power Efficient Ad hoc Routing Protocol
Basically ad hoc mobile devices operate on batteries. Hence, power consumption becomes an Important issue for the researcher. To maximize the lifetime of ad hoc mobile networks, the power consumption rate of each node...
Requirement Elicitation in Web Applications: Challenges
Requirement elicitation is a vital activity in the process of requirement development and it discovers the requirements of end users. The successfulness of this process mainly depends on identifying the appropriate s...
Speech Recognition in Marathi Language on Android O.S.
Speech is the basic mode of communication among human beings. For about four decades human beings have been dreaming of an ”intelligent machine” which can master the natural speech. Speech recognition is the process...
SELECTIVE JAMMING ATTACKS PREVENTION SCHEMES IN WIRELESS NETWORKS USING COMBINED CRYPTOGRAPHIC PRIMITIVES
The open nature of the wireless average greeneries it susceptible to intended interfering attacks, typically referred to as blocking. This intended interfering with wireless transmissions can be used as a Launch pad...