CONDITIONAL PRIVACY PROTOCOL TO OVERCOME SECURITY THREATS IN WIRELESS NETWORK TRANSACTIONS

Journal Title: Elysium Journal of Engineering Research and Management - Year 2014, Vol 1, Issue 1

Abstract

Even with several technological developments and security protocols, the wireless network transaction is still not in safe waters. Today we come across several frauds related to this wireless network transactions, the main reason for this is that user data like passwords, account numbers and other private information of the user is accessed by unauthorized persons .The permanent solution to this to protect the user privacy, to secure the users confidential information from the grasps of the hackers by developing a foolproof protocol. Therefore a new security protocol has to be laid, where user identity is hidden and the public key of the user is secured from the attacks of the hacker. Conditional privacy method using pseudonyms is used to avoid several threatening attacks such as MITM attack (Man-In-The-Middle attack), Eavesdropping and Data modulation in e-payment.

Authors and Affiliations

Geetha B. T. , Srinath M V, Perumal V

Keywords

Related Articles

HIGH SPEED AND LOW POWER CMOS TECHNOLOGY BASED RAM-CAM MEMORY DESIGN

ontent-Addressable Memory (CAM) is a special type of memory, which is used in very-high speed searching applications. The other names of CAM are the associative memory, associative storage and the assoc...

Working Principle of Semidual Dynamic Bridge Converter with Dual Source

A soft-switching circuit topology derived from the semi dual- Dynamic-bridge converter(S-DDB) get wide attention for applications requiring unidirectional power flow such as the dc-dc stage of a photovoltaic power conver...

A Model for Trusted Cloud Computing with Remote Attestation

Enforcing an interactive pattern in any association will force it to behave in the predictable way thorough which it can be secured against any unauthorized access leading to a trusted atmosphere. Security declaration in...

MULTI DESIGN PICTURE ANALYSIS VIA HUGE-STRUCTURE DESIGN INTERACTION CONSUMED ACTIVITY STUDY

Multi-label image classification problems have been solved by the supervised machine learning techniques with incredible profit. In spite of, un-equivalent mechanisms and their performances strongly...

GAIT ANALYSIS BY DIFFERENT TECHNIQUES

Gait analysis is used in clinical evaluation of musculoskeletal system, design and assessment of prosthesis (especially for lower limbs), in the process of rehabilitation after injury and in biometrics. This paper review...

Download PDF file
  • EP ID EP362830
  • DOI -
  • Views 147
  • Downloads 0

How To Cite

Geetha B. T. , Srinath M V, Perumal V (2014). CONDITIONAL PRIVACY PROTOCOL TO OVERCOME SECURITY THREATS IN WIRELESS NETWORK TRANSACTIONS. Elysium Journal of Engineering Research and Management, 1(1), 53-61. https://europub.co.uk./articles/-A-362830