ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A BATCH AUTHENTICATI ON SCHEMA TO IDENTIF Y THE INVALID SIGNATURE IN WIRELES S NETWORK

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.6, No. 2)

Publication Date:

Authors : ; ; ; ;

Page : 268-272

Keywords : Batch Verification; Nash Equilibriums; Invalid Signature;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. Security is the most important thing in transmission of data. In wireless networ k the security is less and invalid data can be easily transmit to the receiver by the intermediator(attacker). To improve the security of the data batch cryptography is used. The batch cryptography consist of batch verification and identification. By using these method data protection can be done in the wireless network. To find the intermediator who produce the invalid signature the Nash Equilibrium is used. The nash equilibrium will help in the finding the intermediate node in the dynamically changing net work. It will have a history of data transmitted node from the source to the destination.

Last modified: 2017-02-11 20:17:50