Spontaneous Wireless ADHOC Network Creation, To Enhance Authentication Based On Self Configure Secure Protocol
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
The proposal paper presents a self configured secure protocol for spontaneous wireless Adhoc networks which uses hybrid symmetric/ asymmetric scheme for encryption of the data. My proposal is to create a Spontaneous network with self configure secure protocol, to enhance the authentication during the communication over the network. The spontaneous network has without any infrastructure and central administrative. In spontaneous, when the nearby devices are interconnecting with each other, for short period of time and network is formed instantly without any infrastructure to exchange the information and to exchange the secret keys that will be used to encrypt data. The network will be created spontaneously for the completion of particular task that includes sharing resources with secure services. After completion of task the network will be disconnect from the network. In existing system of Adhoc wireless network plays to sharing of data with limited resources. In our proposal is to be creating a network for unlimited resources to join in the network, share the secure services for an authentication, and save energy of network without loss of packets.
Authors and Affiliations
N. Indumathi, D. Deva Hema
Efficient Image Pixel Comparison in Background Subtraction for Real Time Motion Estimation
Digital video coding has gradually increased in importance since the 90s when MPEG-1 first emerged. It has had large impact on video delivery, storage and presentation. Compared to analog video, video coding achieves hi...
Computing while Charging: Building a Distributed Computing Infrastructure using Smartphones
Every night, a large range of idle smartphones square measure blocked into an influence supply for recharging the battery. Given the increasing computing capabilities of smartphones, these idle phones constitute a sizea...
“Design of New Technology Captcha as Graphical Password Using AI”
Many security primitives are building on hard mathematical problems. Via hard AI problems for security is emerging as an exciting novel paradigm, but has been under explored. In this paper, we present a new security pri...
Limitation of Classical Bending Theory in Isotropic and FRP Beams
In this paper, the deflections and the bending stresses of beam due to a uniform load, for various dimensions of the beam, are calculated by using classical beam bending theory and the same is once again calculated by m...
Security Of Cloud Data With Logging Using Jar File
Now-a-days, Cloud Computing technology is growing at a very fast pace. Currently, most of the people are using Cloud Computing technology. Cloud computing allows extremely scalable services to be consumed at ease over t...