CONDITIONAL PRIVACY PROTOCOL TO OVERCOME SECURITY THREATS IN WIRELESS NETWORK TRANSACTIONS

Journal Title: Elysium Journal of Engineering Research and Management - Year 2014, Vol 1, Issue 1

Abstract

Even with several technological developments and security protocols, the wireless network transaction is still not in safe waters. Today we come across several frauds related to this wireless network transactions, the main reason for this is that user data like passwords, account numbers and other private information of the user is accessed by unauthorized persons .The permanent solution to this to protect the user privacy, to secure the users confidential information from the grasps of the hackers by developing a foolproof protocol. Therefore a new security protocol has to be laid, where user identity is hidden and the public key of the user is secured from the attacks of the hacker. Conditional privacy method using pseudonyms is used to avoid several threatening attacks such as MITM attack (Man-In-The-Middle attack), Eavesdropping and Data modulation in e-payment.

Authors and Affiliations

Geetha B. T. , Srinath M V, Perumal V

Keywords

Related Articles

IMPROVING SECURITY AND DEDUPLICATION FOR OUTSOURCED DATABASE IN CLOUD COMPUTING

To improve the security of data by using Elliptic Curve Cryptography (ECC) Algorithm. The duplicated data will be detected and avoid with a Secure Hash Algorithm (SHA). In many case when the dishonest Cloud Service Provi...

FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE

Efficient monitoring and preventing process requires allocation and policies to network administrator implies network security. The main communication link for individual and organizational convers...

DETECTION AND PREVENTION OF MALICIOUS FEEDBACK RATING IN WEB SERVICE RECOMMENDATION SYSTEMS

To facilitate a recommendation to users for selecting an appropriate or reputed web service from mass of services by avoiding dishonest recommendation. To prevent, avoid and de...

PRIVACY PROTECTION FOR SECURE DATA ENCRYPTION IN ONLINE SOCIAL NETWORKS

Network security is an act of protecting the information from unauthorized access; it controls and monitors the security of the whole network. The threats to network security are alarmingly increasing day by...

Kidney Disease Identification Using Automatic 3D Segmentation

Various layers of kidney can be affected by different kinds of disease. That is renal cortex, renal column, renal medulla and renal pelvis. For example, kidney tumor usually occurs in renal cortex, renal column hypertrop...

Download PDF file
  • EP ID EP362830
  • DOI -
  • Views 150
  • Downloads 0

How To Cite

Geetha B. T. , Srinath M V, Perumal V (2014). CONDITIONAL PRIVACY PROTOCOL TO OVERCOME SECURITY THREATS IN WIRELESS NETWORK TRANSACTIONS. Elysium Journal of Engineering Research and Management, 1(1), 53-61. https://www.europub.co.uk/articles/-A-362830