A Survey Paper of Proximity-Based Security Techniques for Mobile Users in Wireless Networks Multi Level Location Based Session Aggregator
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

A Survey Paper of Proximity-Based Security Techniques for Mobile Users in Wireless Networks Multi Level Location Based Session Aggregator

Shripadrao Biradar, Chetna Salame

In this system, the proximity based authentication and multi level session key establishment are implemented based on spatial temporal location tags. Constituting the unique physical features of the signals sent from multiple ambient radio sources, the attacker cannot easily forged the location tags. More specifically, each radio DDS builds a public location tag according to the received signal sequence numbers, strength indicators and media access control (MAC) addresses of the ambient packets. Each DDS also keeps a secret location tag that consists of the packet arrival time information to generate the multi level session keys. As DDSs never disclose their secret location tags and this system is robust against spoofers and eavesdroppers outside the proximity range.

Keywords: Authentication, encryption, wireless networks, Gaussian mixture model

Edition: Volume 3 Issue 11, November 2014

Pages: 2212 - 2213

Share this Article

How to Cite this Article?

Shripadrao Biradar, Chetna Salame, "A Survey Paper of Proximity-Based Security Techniques for Mobile Users in Wireless Networks Multi Level Location Based Session Aggregator", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141514, Volume 3 Issue 11, November 2014, 2212 - 2213

91 PDF Views | 87 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2234 - 2237

Analysis of Protective Mechanism in Roaming Network for Secure Communication

Ashwini A. Lokhande, Sonali U. Nimbhorkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Similar Articles with Keyword 'encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Similar Articles with Keyword 'wireless networks'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article

Similar Articles with Keyword 'Gaussian mixture model'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1907 - 1913

Human Gait Recognition Using Multisvm Classifier

Saranya Sasidharan, Smitha K S, Minu Thomas

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1612 - 1617

Intrusion Detection in Dynamic Distributed Network Using PSO and SVM Machine Learning Algorithms

Amol S. Jadhav, Dhanashree Kulkarni

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2212 - 2213

A Survey Paper of Proximity-Based Security Techniques for Mobile Users in Wireless Networks Multi Level Location Based Session Aggregator

Shripadrao Biradar, Chetna Salame

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1307 - 1311

A Review of Automatic Speaker Age Classification, Recognition and Identifying Speaker Emotion Using Voice Signal

Shivaji Chaudhari, Ramesh Kagalkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1984 - 1987

Automatic VOE Techniques using CRF and Visual Saliency Method

Dr. Swathi. K, Sivabalan.T, Vijayanathan.R

Share this Article
Top