A BATCH AUTHENTICATI ON SCHEMA TO IDENTIF Y THE INVALID SIGNATURE IN WIRELES S NETWORK
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.6, No. 2)Publication Date: 2017-03-02
Authors : N.Deepa Assistant; A.Sakthivel Student; M.Rengesh Student; S.Sai Aravindhan Student;
Page : 268-272
Keywords : Batch Verification; Nash Equilibriums; Invalid Signature;
Abstract
Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. Security is the most important thing in transmission of data. In wireless networ k the security is less and invalid data can be easily transmit to the receiver by the intermediator(attacker). To improve the security of the data batch cryptography is used. The batch cryptography consist of batch verification and identification. By using these method data protection can be done in the wireless network. To find the intermediator who produce the invalid signature the Nash Equilibrium is used. The nash equilibrium will help in the finding the intermediate node in the dynamically changing net work. It will have a history of data transmitted node from the source to the destination.
Other Latest Articles
- AGE GROUP CLASSIFICATION USING FACE FEATURES
- PAPER PRINTED PHOTOVOLTAIC CELLS: EMERGING METHOD OF PV CELL PRODUCTION
- A CRITICAL REVIEW ON BASE ISOLATION TECHNIQUES FOR ITS APPLICATION AS EARTH QUAKE RESISTANT BUILDINGS WITH PARTICULAR NEED/ADHERENCE IN EASTERN UTTAR PRADESH
- SELECTIVE EXTRACTION AND SPECTROPHOTOMETRIC DETERMINATION OF MOLYBDENUM (v) WITH N - HYDROXY ? N (2 - METHYL) PHENYL N’ (2 - FLUORO) BENZAMIDINE HYDROCHLORIDE AND THIOCYANATE
- DEVELOPMENT OF SCENARIOS FOR INCREASING THE EFFECT OF INTERIOR LIGHTING AUTOMATION TO ENERGY EFFICIENCY
Last modified: 2017-02-11 20:17:50