Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 2
Abstract
Cryptography is the idea of protected communication. Security guaranteed by different crypto ways of encryption, decryption, secret key establishment, etc .One such way is Keyless Cryptosystem. This new technique of Cryptosystem uses the procedure where security is guaranteed by concealing the distinctiveness of the sender of the information by not using the usual crypto techniques. Keyless does not mean that there are no keys; it actually means the procedure of hiding the senders Identity by using the random secret key. The sender and receiver of the communication use a protocol that crafts a random key. These ambiguous keys do not allow the middle man to get an idea on the key imagining that the channel of communication is anonymous. This unidentified channel is ideal to hide the sender’s identity, without affecting the actual message passed between the sender and the receiver. This is a leap over in the findings of cryptography .By using very limited or no Crypto techniques the security of communication between the dispatcher and recipient of message. Many Algorithms stand as a proof to the efficient working of this novel technique. A study of this is elaborated in this research paper. This technique is efficiently used in smart phones running on iOS, Android for assuring at most security
Integration of a City GIS Data with Google Map API and Google Earth API for a Web Based 3D Geospatial Application
Geospatial applications are becoming indispensible part of information systems, they provides detailed information?s regarding the attribute data of spatial objects in real world. Due to the rapid technological developme...
WSN Localization in 3-D Environments to Minimize the Localization Errors
The development of wireless sensor network have brought dominant transition in the current extent of research and development because it is extensively used in the various applications around the world.Localization of se...
Ethics and Social Impact of Information Systems in Our Society: Analysis and Recommendations
The evolution of information systems in our society today has grossly affected the way we live our lives. This has invariably led to the increase in ethical and social impacts that are rising in the society from health r...
Bottom-Up Generalization: A Data Mining Solution to Privacy Protection
"In recent years, privacy-preserving data mining has been studied extensively, because of the wide proliferation of sensitive information on the internet. This paper investigates data mining as a technique for masking da...
Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network
"We address the problem of selective attacks in wireless networks. In these attacks, the opponent selectively targets specific packets of "