Spontaneous Wireless ADHOC Network Creation, To Enhance Authentication Based On Self Configure Secure Protocol
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
The proposal paper presents a self configured secure protocol for spontaneous wireless Adhoc networks which uses hybrid symmetric/ asymmetric scheme for encryption of the data. My proposal is to create a Spontaneous network with self configure secure protocol, to enhance the authentication during the communication over the network. The spontaneous network has without any infrastructure and central administrative. In spontaneous, when the nearby devices are interconnecting with each other, for short period of time and network is formed instantly without any infrastructure to exchange the information and to exchange the secret keys that will be used to encrypt data. The network will be created spontaneously for the completion of particular task that includes sharing resources with secure services. After completion of task the network will be disconnect from the network. In existing system of Adhoc wireless network plays to sharing of data with limited resources. In our proposal is to be creating a network for unlimited resources to join in the network, share the secure services for an authentication, and save energy of network without loss of packets.
Authors and Affiliations
N. Indumathi, D. Deva Hema
An Evaluation of Energy Absorption by Bullet Resistant Glass and its Mechanical Properties
In this research, the investigation is done to increase the energy absorption capacity of BRGLC by varying its thickness. For this purpose we use interlayer of PVB, PU and PC. This research shows that by introducing PVB...
Efficient Segmentation Technique for Restoration of Degraded Images
The process of extracting text from degraded document images is a very difficult task because of high inter/intra variations between document background and foreground. In this paper we propose a better document image b...
A Image Retrieval Based on Finger Print Dataset
Today time with the increase in population crime increases day by day, and Police Department have over loaded work. To decrease the crime and to identify the theft and criminal, we try to make a new age safety system in...
A Review on Planning for An Exploratory Well
A well is planned generally to ensure it is safe and economical in nature. It integrates engineering principles co-private or personal philosophies. Prospect development, data collection, pore formation, geology, casing...
Big Data Security Using System Logs
A series of recent high-profile security breaches have underscored that malware prevention strategies are consistently failing to adequately protect enterprises from advanced persistent threats (APTs). It’s time to embr...