Intrusion Detection, Secure Protocol & Network Creation for Spontaneous Wireless AD HOC Network?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 2)Publication Date: 2014-02-28
Authors : Nikhil Varghane Bhakti Kurade Chandradas Pote;
Page : 389-394
Keywords : public key; private key; cryptography; secure protocol; spontaneous network; wireless ad hoc networks; peer to peer network;
Abstract
Fundamental aspect in wireless network creation & wireless communication is use of security so this paper proposing a secure protocol for spontaneous wireless ad hoc networks which uses an hybrid public ,private key scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will be used to encrypt the data. The protocol offers Network creation, protocol messages, and network management communication. We presenting self-configured secure protocol that is able to create the network and share networks secure services. The network allows sharing resources and new services among users in a secure environment. Our proposal has been implemented in order to test the protocol procedure and working. Finally, we compare the protocol with other spontaneous ad hoc network protocols in order to highlight its features and we provide a security analysis of the system. A Spontaneous ad-hoc network is a complete self-configured secure protocol which is able to create the network and share secure services without any previous setup. The network permits sharing resources and offering new services among users in a securely. The protocol contains all functionality required to operate without any outer support. Design of a protocol permits the creation and management of a spontaneous wireless ad hoc network
Other Latest Articles
- RESONALITY RELATED FACTORS AND THEIR IMPLICATIONS IN TERRITORY FORMATION FOR PHARMACEUTICAL SALES FORCE: AN EMPERICAL INVESTIGATION
- Efficient Routing from Multiple Sources to Multiple sinks in Wireless Sensor Networks
- Improvement of Email Summarization Using Statistical Based Method?
- A Supervised Method for Multi-keyword Web Crawling on Web Forums?
- DETECTING NODE REPLICATION ATTACKS IN STATIC AND MOBILE SENSOR NETWORKS USING SPRT?
Last modified: 2014-02-20 21:16:41