Trapping Unauthorized Signals in Jammer
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015

Trapping Unauthorized Signals in Jammer

Meena Kudande, D. C. Mehetre

This paper presents a mechanism, called Authorized Jammer, which provide jamming capability that can trapped unauthorized wireless signals and at the same time access authorized communication. The jammer jams the wireless signals continuously by using secret keys, so that the jamming signals identify the signals come from unauthorized devices, and can access the signals by authorized devices with the secret keys. To achieve this jammer by developing new design circuit for trapping the signals. This paper assume authorized devices as mobile phones signals and other than that assume unauthorized devices.

Keywords: Authorized Jammer, Public Key cryptography, Elliptic curve

Edition: Volume 4 Issue 7, July 2015

Pages: 1934 - 1936

Share this Article

How to Cite this Article?

Meena Kudande, D. C. Mehetre, "Trapping Unauthorized Signals in Jammer", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156726, Volume 4 Issue 7, July 2015, 1934 - 1936

68 PDF Views | 64 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Public Key cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2086 - 2089

Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography

Anagha P. Zele, Avinash P. Wadhe

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 428 - 431

A Secure Account based Mobile Payment Protocol with Public Key Cryptography and Biometric Characteristics

Pawandeep Singh Aujla, Harneet Arora

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1934 - 1936

Trapping Unauthorized Signals in Jammer

Meena Kudande, D. C. Mehetre

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017

Pages: 1778 - 1781

A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer

Surya Ahuja, Nishit Angrish

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 105 - 108

A Security Enhancing Scheme in Leach using Homomorphic Encryption

Neha Chhabra, Parikshit Singla

Share this Article

Similar Articles with Keyword 'Elliptic curve'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2086 - 2089

Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography

Anagha P. Zele, Avinash P. Wadhe

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1884 - 1890

Enhancing Data Security Using Elliptic Curve Cryptography in Cloud Computing

Depavath Harinath

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2174 - 2177

Key Agreement Protocol Based On EC-MQV Algorithm for Cooperative Wireless Communication

Anagha Dhargave, S. U. Nimbhorkar

Share this Article
Top