Procedure To Establish A Secure Self-Configured Environment For Data Distribution And Services Sharing Among Users
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 2
Abstract
A spontaneous network is a particular case of ad hocnetworks. They usually have little or no dependence on acentralized administration. Spontaneous networks can bewired or wireless. We regard as only wireless spontaneousnetworks in this paper. Their objective is the integration of services and devices in the same environment enabling theuser to have instant service without any external infrastructure.Because these networks are implemented indevices such as laptops, PDAs or mobile phones withlimited capacities they must use a lightweight protocol andnew methods to control manage and integrate them. To resolve mentioned securityissues we used an authentication phase and a trust phase. Moreover we presented a method to allow nodesto check the legitimacy of their IP addresses while notgenerating duplicated IP addresses. The mechanism helpsnodes to authenticate by using their IP addresses. We haveused this mechanism in the secure protocol presented inthis paper.
Authors and Affiliations
Syam Kumar Nallamothu| Dept. of CSE, Nimra Institute of Science & Technology, Vijayawada, AP, India, Amanatulla Mohammad| Dept. of CSE, Nimra Institute of Science & Technology, Vijayawada, AP, India, Sayeed Yasin| Dept. of CSE, Nimra Institute of Science & Technology, Vijayawada, AP, India
A Unified Control Startergy For Three Phase Inverter In Dg
This paper presents a neutral point clamped technique based three-phase inverter with grid connected system that operates in both islanded and grid-tied modes. This paper presents the detailed analysis and the parame...
Monitoring and minimizing the Total Energy consumption in Mobile Nodes at the end-to-end Quality of Service
In general mobile networks are highly unpredictable at the end-to-end quality-ofservice (QoS) and the scale of the individual node. Due to its high requirement and complicated security issues researchers concentrated...
DC Link Capacitor Voltage of D-Statcom With Fuzzy Logic Supervision
In a DSTATCOM, generally, the dc capacitor voltage is regulated using a PI controller when various control algorithms are used for load compensation. However, during load changes, there is considerable variation in d...
Detection of Behavioral Malware in Delay Tolerant Networks
Disruption-tolerant networking has gained currency in the United States due to support from DARPA, which has funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of m...
Maximum Data Rate Determination of a Telephone Transmission Channel
The transmission channel is a medium that transfers the information from the source to the destination. So many forms of media are available; some of them are pair of wires, a coaxial cable, a radio path, or an optic...