Downloads: 108 | Views: 243
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.1 / 10
Trapping Unauthorized Signals in Jammer
Meena Kudande, D. C. Mehetre
Abstract: This paper presents a mechanism, called Authorized Jammer, which provide jamming capability that can trapped unauthorized wireless signals and at the same time access authorized communication. The jammer jams the wireless signals continuously by using secret keys, so that the jamming signals identify the signals come from unauthorized devices, and can access the signals by authorized devices with the secret keys. To achieve this jammer by developing new design circuit for trapping the signals. This paper assume authorized devices as mobile phones signals and other than that assume unauthorized devices.
Keywords: Authorized Jammer, Public Key cryptography, Elliptic curve
Edition: Volume 4 Issue 7, July 2015
Pages: 1934 - 1936
Similar Articles
Downloads: 103
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2223 - 2228Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2174 - 2177Key Agreement Protocol Based On EC-MQV Algorithm for Cooperative Wireless Communication
Anagha Dhargave, S. U. Nimbhorkar
Downloads: 107
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1952 - 1957Navigation Query Security through Privacy Preservation and Cryptography in VANETs
Anuradha T, Saba Tahseen
Downloads: 107
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1235 - 1237Single Sign-on Secure Password Mechanism for Distributed Computer Networks
Deepali M. Devkate, N. D. Kale
Downloads: 111
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2334 - 2337Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm
Priya T V, Sreerag B M