Downloads: 108 | Views: 122
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015
Trapping Unauthorized Signals in Jammer
Meena Kudande | D. C. Mehetre 
Abstract: This paper presents a mechanism, called Authorized Jammer, which provide jamming capability that can trapped unauthorized wireless signals and at the same time access authorized communication. The jammer jams the wireless signals continuously by using secret keys, so that the jamming signals identify the signals come from unauthorized devices, and can access the signals by authorized devices with the secret keys. To achieve this jammer by developing new design circuit for trapping the signals. This paper assume authorized devices as mobile phones signals and other than that assume unauthorized devices.
Keywords: Authorized Jammer, Public Key cryptography, Elliptic curve
Edition: Volume 4 Issue 7, July 2015,
Pages: 1934 - 1936
Similar Articles with Keyword 'Public Key cryptography'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015Pages: 1952 - 1957
Navigation Query Security through Privacy Preservation and Cryptography in VANETs
Anuradha T  | Saba Tahseen
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015Pages: 2086 - 2089
Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography
Anagha P. Zele | Avinash P. Wadhe