Proficient Authentication Mechanism for Mobile and Pervasive Computing
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. With today’s technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. By taking advantage of the fact that the message to be authenticated must also be encrypted, we propose provably secure authentication codes that are more efficient than any message authentication code in the literature. The key idea behind the proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives.
Authors and Affiliations
Kantamraju Anuhya| M.Tech (CSE), Usha Rama College of Engineering and Technology, A.P., India, G Syam Prasad| Head of the Department, Dept. of Computer Science & Engineering, Usha Rama College of Engineering and Technology, A.P., India
Moisture Susceptibility on Asphalt Mix and the Effect of AntiStripping Additives
The damage due to moisture can be result in asphalt pavements either due to stripping or the softening of asphalt, both of which result in loss of ability to resist traffic- induced stresses which is mainly occur due...
Percolate And M Supremacy User Walls By Using Pfw
Users have attraction about on social networks they are ready to keep in touch with his/her friends by seesawing different information of meta data. Now a day social networks have more privacy and security problems a...
Acknowledgement based Intrusion-Detection System for MANETS
In the next generation of wireless communication systems, there will be a need for the quick deployment of independent mobile users. notable examples include establishing survivable, efficient, flush communication for...
A Distributed Solution For Npv In Mobile Adhoc Networks To Verify The Position Of Communication Neighbours
A distributed solution for NPV any node in a mobile ad hoc network to verify the position of its communication neighbours without depending on a priori trustworthy nodes. In absence of a priori trusted nodes the disc...
Implementation of Area Efficient and High Bit Rate Serial-Serial Multiplier With On-the-Fly Accumulation by Asynchronous Counters
Traditional Serial-Serial multiplier addresses the high data sampling rate. It is effectively considered as the entire partial product matrix with n data sampling cycle for n×n multiplication function instead of 2n...