A Survey Paper of Proximity-Based Security Techniques for Mobile Users in Wireless Networks Multi Level Location Based Session Aggregator
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 320

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 6.1 / 10


     

A Survey Paper of Proximity-Based Security Techniques for Mobile Users in Wireless Networks Multi Level Location Based Session Aggregator

Shripadrao Biradar, Chetna Salame


Abstract: In this system, the proximity based authentication and multi level session key establishment are implemented based on spatial temporal location tags. Constituting the unique physical features of the signals sent from multiple ambient radio sources, the attacker cannot easily forged the location tags. More specifically, each radio DDS builds a public location tag according to the received signal sequence numbers, strength indicators and media access control (MAC) addresses of the ambient packets. Each DDS also keeps a secret location tag that consists of the packet arrival time information to generate the multi level session keys. As DDSs never disclose their secret location tags and this system is robust against spoofers and eavesdroppers outside the proximity range.


Keywords: Authentication, encryption, wireless networks, Gaussian mixture model


Edition: Volume 3 Issue 11, November 2014


Pages: 2212 - 2213



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Shripadrao Biradar, Chetna Salame, "A Survey Paper of Proximity-Based Security Techniques for Mobile Users in Wireless Networks Multi Level Location Based Session Aggregator", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 2212-2213, https://www.ijsr.net/getabstract.php?paperid=OCT141514, DOI: https://www.doi.org/10.21275/OCT141514

Similar Articles

Downloads: 161 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 629 - 634

A Face Spoof Detection using Feature Extraction and SVM

Lovely Pal, Renuka Singh

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023

Pages: 2966 - 2970

Security in Kubernetes: A Comprehensive Review of Best Practices

Dinesh Reddy Chittibala

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article
Top