Dynamic Key for Secure Communication among the Flexible Nodes
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 117 | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014

Dynamic Key for Secure Communication among the Flexible Nodes

Vijay Kumar Mahto, D. Praveen Kumar

This project presents a dynamic key for secure communication among the flexible node which uses a hybrid symmetric /asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will be used to encrypt the data. Trust is based on the first visual contact between users. Our proposal is a complete self-configured secure protocol that is able to create the network and share secure services without any infrastructure. The network allows sharing resources and offering new services among users in a secure environment. The protocol includes all functions needed to operate without any external support. We have designed and developed it in devices with limited resources. Network creation stages are detailed and the communication, protocol messages, and network management are explained. Our proposal has been implemented in order to test the protocol procedure and performance. Finally, we provide a security analysis of the system.

Keywords: Distributed protocol, Secure protocol, Spontaneous network, Wireless ad hoc networks, Dynamic key

Edition: Volume 3 Issue 3, March 2014

Pages: 459 - 462

Share this Article

How to Cite this Article?

Vijay Kumar Mahto, D. Praveen Kumar, "Dynamic Key for Secure Communication among the Flexible Nodes", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131163, Volume 3 Issue 3, March 2014, 459 - 462

Enter Your Registered Email Address





Similar Articles with Keyword 'Distributed protocol'

Downloads: 102 | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2075 - 2077

Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN

Rekha V. Aher, Sunita Nandagave

Share this Article

Downloads: 112 | Weekly Hits: ⮙4 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1499 - 1503

Enhanced Distributed Detection Protocol for Node Replication Attack

Aiswaria E S

Share this Article

Downloads: 114 | Weekly Hits: ⮙2 | Monthly Hits: ⮙7

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2571 - 2577

Large-Scale Cost-Effective Secured Content Distribution in the Cities Using Vehicular Networks

Vinay M Naganur, Anand R

Share this Article

Downloads: 114 | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1193 - 1198

MAC Algorithm for Cognitive Radio Networks Based on Traffic Type

Ashwini S, Manjul Krishna Gupta

Share this Article

Downloads: 116 | Weekly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2105 - 2109

Analysis of Clustering Algorithms

Navneet Kaur, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Secure protocol'

Downloads: 102 | Weekly Hits: ⮙4 | Monthly Hits: ⮙15

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1936 - 1939

Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way

D. Hemalatha, R. Arunudaya

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1478 - 1481

A Secure Protocol for SMS Mobile Banking

Amol B. Jawanjal, R. B. Joshi

Share this Article

Downloads: 111 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 510 - 514

A Survey on Continuous User Identity Verification Using Biometric Traits for Secure Internet Services

Harshal A. Kute, D. N. Rewadkar

Share this Article

Downloads: 112 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 1042 - 1047

A Secure End-To-End Protocol for Secure Transmission of SMS

Vaidehi V. Mantri, M. Y. Joshi

Share this Article

Downloads: 114 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1152 - 1154

A Survey on Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks (CWSN)

Vijay Kukre, Shubhangi Vairagar

Share this Article

Similar Articles with Keyword 'Wireless ad hoc networks'

Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Informative Article, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 74 - 79

Mobile Ad hoc Network

R. Marutha Veni, R. Latha

Share this Article

Downloads: 117 | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 459 - 462

Dynamic Key for Secure Communication among the Flexible Nodes

Vijay Kumar Mahto, D. Praveen Kumar

Share this Article

Downloads: 117 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Survey Paper, Computer Science & Engineering, Tanzania, Volume 3 Issue 10, October 2014

Pages: 747 - 751

A Survey of Intrusion Detection on Spontaneous Wireless Adhoc Networks

Thangaraj E, Arockia Jayadhas S

Share this Article

Downloads: 121 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 449 - 451

A Survey on MANETs in Disaster Rescue Operations

C Ramakristanaiah, R. Praveen Sam

Share this Article

Downloads: 130 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 104 - 108

A Reformed Security Scheme for False Node Detection in Wireless Ad Hoc Networks

J. Nithyapriya, Dr. V. Pazhanisamy

Share this Article

Similar Articles with Keyword 'Dynamic key'

Downloads: 99 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 104 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Downloads: 117 | Weekly Hits: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 459 - 462

Dynamic Key for Secure Communication among the Flexible Nodes

Vijay Kumar Mahto, D. Praveen Kumar

Share this Article



Top