Downloads: 109 | Views: 320
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 6.1 / 10
A Survey Paper of Proximity-Based Security Techniques for Mobile Users in Wireless Networks Multi Level Location Based Session Aggregator
Shripadrao Biradar, Chetna Salame
Abstract: In this system, the proximity based authentication and multi level session key establishment are implemented based on spatial temporal location tags. Constituting the unique physical features of the signals sent from multiple ambient radio sources, the attacker cannot easily forged the location tags. More specifically, each radio DDS builds a public location tag according to the received signal sequence numbers, strength indicators and media access control (MAC) addresses of the ambient packets. Each DDS also keeps a secret location tag that consists of the packet arrival time information to generate the multi level session keys. As DDSs never disclose their secret location tags and this system is robust against spoofers and eavesdroppers outside the proximity range.
Keywords: Authentication, encryption, wireless networks, Gaussian mixture model
Edition: Volume 3 Issue 11, November 2014
Pages: 2212 - 2213
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 161 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal, Renuka Singh
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023
Pages: 2966 - 2970Security in Kubernetes: A Comprehensive Review of Best Practices
Dinesh Reddy Chittibala
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash