International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014


A Survey Paper of Proximity-Based Security Techniques for Mobile Users in Wireless Networks Multi Level Location Based Session Aggregator

Shripadrao Biradar [3] | Chetna Salame


Abstract: In this system, the proximity based authentication and multi level session key establishment are implemented based on spatial temporal location tags. Constituting the unique physical features of the signals sent from multiple ambient radio sources, the attacker cannot easily forged the location tags. More specifically, each radio DDS builds a public location tag according to the received signal sequence numbers, strength indicators and media access control (MAC) addresses of the ambient packets. Each DDS also keeps a secret location tag that consists of the packet arrival time information to generate the multi level session keys. As DDSs never disclose their secret location tags and this system is robust against spoofers and eavesdroppers outside the proximity range.


Keywords: Authentication, encryption, wireless networks, Gaussian mixture model


Edition: Volume 3 Issue 11, November 2014,


Pages: 2212 - 2213


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Shripadrao Biradar, Chetna Salame, "A Survey Paper of Proximity-Based Security Techniques for Mobile Users in Wireless Networks Multi Level Location Based Session Aggregator", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 2212-2213, https://www.ijsr.net/get_abstract.php?paper_id=OCT141514

Similar Articles with Keyword 'Authentication'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 629 - 634

A Face Spoof Detection using Feature Extraction and SVM

Lovely Pal [2] | Renuka Singh [2]

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya [10] | R. Sathya [8]

Share this Article
Top