Dynamic Key for Secure Communication among the Flexible Nodes
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 118 | Views: 306

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014 | Popularity: 6.3 / 10


     

Dynamic Key for Secure Communication among the Flexible Nodes

Vijay Kumar Mahto, D. Praveen Kumar


Abstract: This project presents a dynamic key for secure communication among the flexible node which uses a hybrid symmetric /asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will be used to encrypt the data. Trust is based on the first visual contact between users. Our proposal is a complete self-configured secure protocol that is able to create the network and share secure services without any infrastructure. The network allows sharing resources and offering new services among users in a secure environment. The protocol includes all functions needed to operate without any external support. We have designed and developed it in devices with limited resources. Network creation stages are detailed and the communication, protocol messages, and network management are explained. Our proposal has been implemented in order to test the protocol procedure and performance. Finally, we provide a security analysis of the system.


Keywords: Distributed protocol, Secure protocol, Spontaneous network, Wireless ad hoc networks, Dynamic key


Edition: Volume 3 Issue 3, March 2014


Pages: 459 - 462



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Vijay Kumar Mahto, D. Praveen Kumar, "Dynamic Key for Secure Communication among the Flexible Nodes", International Journal of Science and Research (IJSR), Volume 3 Issue 3, March 2014, pp. 459-462, https://www.ijsr.net/getabstract.php?paperid=20131163, DOI: https://www.doi.org/10.21275/20131163

Similar Articles

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1936 - 1939

Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way

D. Hemalatha, R. Arunudaya

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Downloads: 108

Informative Article, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 74 - 79

Mobile Ad hoc Network

R. Marutha Veni, R. Latha

Share this Article
Top