DEVELOPING A SECURITY PROTOCOL FOR A WIRELESS COMPUTER VIRTUAL LABORATORY (WCVLAB)
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 6
Abstract
For a Virtual Computer Laboratory (VCLAB) to operate effectively within a Wireless intranet setup, a lot of protocols are employed to function. This write-up is aimed at developing a protocol to secure a Wireless Computer Virtual Laboratory (WCVLAB) of any institution. The protocol developed secures a Wireless Computer Virtual Laboratory through an authentication server by supplying authentication parameters at registration, which will be stored to be used at login for comparison. Fingerprint is used to ensure that a user is who he or she claims to be. Duration for access is allotted for a user, after which initial parameters will be supplied for re-authentication. While a user is still logged-on, security questions will be posed intermittently to avoid spoofing. The methodology used for this research is Structured System Analysis and Design. Java Programming Language is used for coding the program and MySQL is the database tool. The result of the implemented system is a secured protocol that guarantees secured access. This is different from the security of other Computer Virtual Laboratory which uses only users name, pin or registration number.
Authors and Affiliations
EDWARD N. UDO , IMO J. EYO , INI J. UMOEKA
ANFIS IN THE CHARACTERIZATION OF FIBROSIS AND CARCINOMA USING LUNG CT IMAGES
The diagnosis of tuberculosis and lung cancer is difficult, as symptoms of both diseases are similar. Due to high TB prevalence and radiological similarities, a large number of lung cancer patients initially get wrongly...
Effective cum Efficient Bandwidth by LZW Compression Technique
The Internet and World Wide Web (WWW) have made electronic commerce a reality. According to an estimate the WWW presently contains more than 800 millions pages, encompassing about 6 terabytes of text data on about 3 mill...
DETECTING THE USEFUL ELECTROMYOGRAM SIGNALS–EXTRACTING, CONDITIONING & CLASSIFICATION
Surface EMG is an important signal containing the information in form of electrical signals referred as myoelectric signals, used in designing & development of many prosthesis and clinical researches applications .Va...
Computer Profiling Based Model for Investigation
Computer profiling is used for computer forensic analysis, and proposes and elaborates on a novel model for use in computer profiling, the computer profiling object model. The computer profiling object model is an inform...
A Review of Malicious Attack in Mobile Ad-Hoc Network Based On Power Constraints
The minimization of power in wireless sensor network is big issue. If the process of energy constraints is optimized increase the reliability and security of mobile ADHOC network. The management of ADHOC network is great...