SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1103
DEVICE AUTHENTICATION WIRELESS NETEWORK FOR SECURED
COMMUNICATION
Chaithra N T1, Dr. Mahesh K Kaluti2
1M Tech, CSE, Dept. of Computer Science and Engineering, PESCE, Mandya
2Guide, Dept of computer science and engineering, PESCE, Mandya
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In day-to-day life, providing security for devices is
very important as the intruders are finding ways to access the
data in networks especially in wireless networks. When the
communication takes place between 2 or more devices and if
the devices are not authenticated, then it becomesveryeasyfor
the intruders to access the data that leads to fatal
circumstances. This situation needs to be tackled and a
solution is to be provided. So, we propose a simple, efficient
authentication mechanism where in the devices authenticated
at first and then the user in a particular group will be
authenticated to share data or information.
Keywords- Authentication, Smart Card, Seed Box, Nonce
Process, OTP
INTRODUCTION
Wireless Internet access technology is being increasingly
deployed in both office and public environments, as well as
by internet users at home.
*Security in Computer world determines the ability of the
system to manage, protect and distribute sensitive
information. Security cannot rely on central servers, asthere
are no guarantees that they will be in radio range all times -
devices’ availability and motion are quite unpredictable in
mobile ad hoc networks.
* Authentication for Devices is a new technique to provide
security
for networks. This project proposesand implementsadevice
authentication mechanism in which the devices that need to
communicate with each other must belong tothesamegroup
and should be authenticated for communication by using
Shamir's secret sharing algorithm.
Section 2
LITERATURE SURVEY
2.1 Device Authentication Using Novel Smart Card Software
[10]
It is a simple device authentication framework which
provides device-oriented authentication and authorization
mechanisms for non-PC Internet-ready information
appliances. The purpose of the framework is to prevent
device spoofing, and to restrict unauthorized access to the
device in a future ubiquitous network. Here the smart card
will be attached to a device such as an information appliance.
Disadvantage: If the card getstampered or damagedthenthe
device authentication will be a problem in this system.
2.2 Gesture based user authentication and face recognition
system [11]
Here the user authentication is based on gestures and facial
expression captured by a video camera. Unlike pure
biometrics, such as fingerprints, iris scans,andfaces,gesture-
based authentication combines irrevocable biometric
information, such as the shapes and relative sizes of body
parts, with voluntary movements which can be revoked.
Disadvantage: Movements and expressions need not always
be same. So authentication using this method is not reliable.
Section 3
SYSTEM ARCHITECTURE
Fig 3a System Architecture
3.1 Device authentication and group authentication
Each device in a group should be registred from the seedbox
separately. Once the registration is successful each device
will be having preshared key within it. When two devices
trying to communicate for any data exchange thenweshould
allow only those devices within the group using nonce
process. So that even though devices are “authenticated, it
requiresto authorise” for data exchange. This isshowninthe
figure Fig 3a.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1104
 Seedbox performs Group Creation in that process,
admin should give Group name & Group key and for
each group,’N’ number of polynomials will be
generated.
 Seedbox is responsible to view requests and take
appropriate action.
 Client node send a registration request for a
particular group to seedbox/admin by providing its
MACID,Owner Name and Group Name.
 Once the node approved for a particular group by
the seedbox and get its key-value pairs, a node
should be authorized to communicate with another
node which is of same group.
3.2 User authentication
 Through login id and password, user authentication
is done.
3.3 Modules used
The proposed mechanism should be placed between the
internal system (e.g. software application) and the external
communication (e.g. wireless interfaces), as a security
middleware. The figure 3a shows the architecture of the
proposed mechanism and its internal building blocks.
 The Seed Box is a storage unit responsible toholdall
known pre-shared keys kn, where each kn
corresponds to one different secure cluster. Eachkn
receives a mnemonic name, assigned by the device’s
owner, to be easily associated to a secure cluster.
 The I/O is the building block responsible for the
communication of the mechanism with the network
communication interfaces (the layer just below the
mechanism).
 The Control Unit involves the functions, wherein a
device enrolls itself for authentication (which
involves nonce process which means generation of
an arbitrary number called cipher text) for the
purpose of communication.
 Shamir’s Secret Sharing (SSS) implementation for
secure key, authentication and Validation process.
 One Time password (OTP) is used to generate a
challenge message.
 For encryption and decryption we use Symmetric
Ciphering.
Section 4
HARDWARE AND SOFTWARE REQUIREMENTS
4.1 Hardware requirements
 2GB RAM
 80GB Hard disk
 Pentium IV and above processor
 At least 4 machines , 1 for administrator, 2 from
one group cluster and another from different
group cluster
4.2 Software requirements
 Operating System: Windows Version
 Software: Visual Studio 2010
 Language: C#
 Application: Windows Forms
Section 5
SYSTEM DESIGN
System design is the process of defining the architecture,
components, modules, interfaces, and data for a system
satisfy specified requirements. It implies a systematic and
rigorous approach to design.
Fig.5a System design
In the beginning the device requests for the registration as
shown in the figure Fig 4.1 by sending its MAC id, group
name to which it wants to join.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1105
 Resource manager manually checks for presence of
the device
 If device is present then he sends he is approval to
the device indicating that it is registered. Seed box
contains the pre shared sets along with the unique
pre shared key for a particular group.
 Once the device is registered for a particular group,
seed box gives the pre shared set using which pre
shared key has to be generated.
 Another device say D2 which is also registered
sends the request for communication, with this
device say D1 as shown in the figure Fig 4.1.
 D1 generates the one time password(OTP)
 This OTP generated is encrypted using the pre
shared key to form cipher text.
 D1 sends the Cipher text to D2 ,D2 using its own pre
shared sets generates pre shared key.
 Then using the preshared key cipher text is
decrypted and it is sent back to D1.
 D1 checks if received message is equal to its own
message. If same, two devices are allowed to
communicate further.
Section 6
IMPLEMENTATION
System implementation is that stage of development life
cycle, when the theoretically designed system is turned in
actual working system. This phase is very critical so it must
be carefully planned and controlled. Otherwise it can cause
chaos. All possible constraints must be taken into
consideration before implementing the system because the
new system must assure the users about its effective
working.
6.1. Modules Implementation
Our project is divided into two main sub parts or divisions-
Node, Seed box.
6.1.1 Group Creation
At the server side the admin can create the different groups
along with its secret key.
Fig 6.1.1a Seed box Operations Snapshot
Fig 6.1.1b Group Creation Snapshot
6.1.2 Remote Registration
In the beginning the device requests for the registration by
sending itsMAC id, group name to which it wantstojoin.This
information is sent to seed box or admin for the approval.
Fig 6.1.2a Node Remote Registration Snapshot
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1106
6.1.3 View Request
The admin can view the pending request and can either
approve, reject, delete the request.
Fig 6.1.3a View Request Snapshot
6.1.4 Join Group
Join Group screen displays list of IP address and
corresponding group name. The Group Joining process is
done between the two nodes which are in same group and
without the interaction of SEEDBOX or ADMIN. Clicking on
the IP address of the device allows the further
communication with it.
Fig 6.1.4a Join Group Snapshot
Section 7
CONCLUSION
The authentication mechanism provided eases out the work
of the people who spend a lot of time in monitoring their
devices. The proposed mechanism thwarts security attacks,
such as Man in the Middle (MitM) and replay attacks. The
proposed mechanism is not only an ad hoc networks secure
solution, and can be set on any kind of computer networks,
offering a light and distributed security solution
BIBLIOGRAPHY
1.Borisov, N. Goldberg, I. and Wagner, D. (2001),Intercepting
Mobile Communications: the insecurity of 802.11. In:
International Conference on Mobile Computing and
Networking - MobiCom’01. Proceedings. Roma, Italia.
2. Bosselaers, A., Govaerts, R. and Vandewalle, J. (1996),Fast
Hash on the Pentium. In: Advances in Cryptology -
CRYPTO’96, Lecture Notes inComputer Science, Springer-
Verlag, and Proceedings. Santa Barbara, CA, USA.
3. Capkun, S., Hubaux, J.P. and Buttyan, L. (2003), Mobility
Helps Security in Ad Hoc Networks - MOBIHOC’03,4.
Proceedings. Annapolis, MD, USA.
4. Feeney, L. and Nilsson, M. (2001), Investigating theEnergy
Consumption of a Wireless Network Interface in an Ad Hoc
Networking Environment. In: IEEE Infocom’01, 20.
Proceedings. Anchorage, AL, USA.
5. Harkins, D. and Carrel, D. (1998), RFC 2409. The Internet
Key Exchange (IKE). IETF Network Working Group Request
for Comments.
6. Krawczyk, H., Bellare, M. and Canetti, R. (1997), RFC 2104.
HMAC: Keyed-Hashing for Message Authentication. IETF
Network Working Group Request for Comments.
7. RSA Security Inc. (2001), RSA SecurID Authentication: a
better value for a better ROI. RSA Whitepaper. Available at:
<http://www.rsasecurity. com/ products/securid/>.
8. Schmidt, B. Schimmler, M. and Adi, W. (2002), Area
Efficient Modular Arithmetic for Mobile Security. In:
International Conference on Wireless Networks - ICWN’02.
Las Vegas: CSREA Press. Proceedings. Las Vegas,NV, USA.
p.208-214.
9. Stajano, F. and Anderson, R. (1999), The resurrecting
duckling: security issues for ad hoc wireless networks.
In:AT&T Software Symposium, 3., Middletown. Proceedings.
NJ, USA.
10. Applications and the Internet Workshops, 2007. SAINT
Workshops 2007. International Symposium [15-19 Jan.
2007]
11. Advanced Video and Signal-Based Surveillance (AVSS),
2012 IEEE Ninth International Conference.

More Related Content

What's hot

Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET Journal
 
IRJET- Keystroke Dynamics for user Authentication
IRJET-  	  Keystroke Dynamics for user AuthenticationIRJET-  	  Keystroke Dynamics for user Authentication
IRJET- Keystroke Dynamics for user AuthenticationIRJET Journal
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET Journal
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
 
IRJET - BI: Blockchain in Insurance
IRJET -  	  BI: Blockchain in InsuranceIRJET -  	  BI: Blockchain in Insurance
IRJET - BI: Blockchain in InsuranceIRJET Journal
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDIJNSA Journal
 
Android Based Smart Department
Android Based Smart DepartmentAndroid Based Smart Department
Android Based Smart DepartmentIRJET Journal
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7EAE
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET Journal
 
License Generator using MAC Address for Industrial Application
License Generator using MAC Address for Industrial ApplicationLicense Generator using MAC Address for Industrial Application
License Generator using MAC Address for Industrial ApplicationIRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Cryptanalysis and Security Enhancement of a Khan et al.'s Scheme
Cryptanalysis and Security Enhancement of a Khan et al.'s SchemeCryptanalysis and Security Enhancement of a Khan et al.'s Scheme
Cryptanalysis and Security Enhancement of a Khan et al.'s Schemeiosrjce
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardConference Papers
 
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned BlockchainIRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned BlockchainIRJET Journal
 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure loginIRJET Journal
 
2-Factor Authentication for PeopleSoft
2-Factor Authentication for PeopleSoft2-Factor Authentication for PeopleSoft
2-Factor Authentication for PeopleSoftHendrix Bodden
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET Journal
 

What's hot (20)

Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
 
IRJET- Keystroke Dynamics for user Authentication
IRJET-  	  Keystroke Dynamics for user AuthenticationIRJET-  	  Keystroke Dynamics for user Authentication
IRJET- Keystroke Dynamics for user Authentication
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
IRJET - BI: Blockchain in Insurance
IRJET -  	  BI: Blockchain in InsuranceIRJET -  	  BI: Blockchain in Insurance
IRJET - BI: Blockchain in Insurance
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
 
Android Based Smart Department
Android Based Smart DepartmentAndroid Based Smart Department
Android Based Smart Department
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
 
License Generator using MAC Address for Industrial Application
License Generator using MAC Address for Industrial ApplicationLicense Generator using MAC Address for Industrial Application
License Generator using MAC Address for Industrial Application
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Cryptanalysis and Security Enhancement of a Khan et al.'s Scheme
Cryptanalysis and Security Enhancement of a Khan et al.'s SchemeCryptanalysis and Security Enhancement of a Khan et al.'s Scheme
Cryptanalysis and Security Enhancement of a Khan et al.'s Scheme
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned BlockchainIRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure login
 
2-Factor Authentication for PeopleSoft
2-Factor Authentication for PeopleSoft2-Factor Authentication for PeopleSoft
2-Factor Authentication for PeopleSoft
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
 

Similar to IRJET- Device Authentication Wireless Netework for Secured Communication

Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesSherry Bailey
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET Journal
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...IRJET Journal
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
 
IRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with DealershipIRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with DealershipIRJET Journal
 
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET Journal
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”IRJET Journal
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat appIRJET Journal
 
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET Journal
 
IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET Journal
 
ONLINE DOCUMENT VERIFICATION
ONLINE DOCUMENT VERIFICATIONONLINE DOCUMENT VERIFICATION
ONLINE DOCUMENT VERIFICATIONIRJET Journal
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing IRJET Journal
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Journals
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Publishing House
 

Similar to IRJET- Device Authentication Wireless Netework for Secured Communication (20)

Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay Examples
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
IRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with DealershipIRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with Dealership
 
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
 
IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data Collection
 
ONLINE DOCUMENT VERIFICATION
ONLINE DOCUMENT VERIFICATIONONLINE DOCUMENT VERIFICATION
ONLINE DOCUMENT VERIFICATION
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
50120140502015
5012014050201550120140502015
50120140502015
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

IRJET- Device Authentication Wireless Netework for Secured Communication

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1103 DEVICE AUTHENTICATION WIRELESS NETEWORK FOR SECURED COMMUNICATION Chaithra N T1, Dr. Mahesh K Kaluti2 1M Tech, CSE, Dept. of Computer Science and Engineering, PESCE, Mandya 2Guide, Dept of computer science and engineering, PESCE, Mandya ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In day-to-day life, providing security for devices is very important as the intruders are finding ways to access the data in networks especially in wireless networks. When the communication takes place between 2 or more devices and if the devices are not authenticated, then it becomesveryeasyfor the intruders to access the data that leads to fatal circumstances. This situation needs to be tackled and a solution is to be provided. So, we propose a simple, efficient authentication mechanism where in the devices authenticated at first and then the user in a particular group will be authenticated to share data or information. Keywords- Authentication, Smart Card, Seed Box, Nonce Process, OTP INTRODUCTION Wireless Internet access technology is being increasingly deployed in both office and public environments, as well as by internet users at home. *Security in Computer world determines the ability of the system to manage, protect and distribute sensitive information. Security cannot rely on central servers, asthere are no guarantees that they will be in radio range all times - devices’ availability and motion are quite unpredictable in mobile ad hoc networks. * Authentication for Devices is a new technique to provide security for networks. This project proposesand implementsadevice authentication mechanism in which the devices that need to communicate with each other must belong tothesamegroup and should be authenticated for communication by using Shamir's secret sharing algorithm. Section 2 LITERATURE SURVEY 2.1 Device Authentication Using Novel Smart Card Software [10] It is a simple device authentication framework which provides device-oriented authentication and authorization mechanisms for non-PC Internet-ready information appliances. The purpose of the framework is to prevent device spoofing, and to restrict unauthorized access to the device in a future ubiquitous network. Here the smart card will be attached to a device such as an information appliance. Disadvantage: If the card getstampered or damagedthenthe device authentication will be a problem in this system. 2.2 Gesture based user authentication and face recognition system [11] Here the user authentication is based on gestures and facial expression captured by a video camera. Unlike pure biometrics, such as fingerprints, iris scans,andfaces,gesture- based authentication combines irrevocable biometric information, such as the shapes and relative sizes of body parts, with voluntary movements which can be revoked. Disadvantage: Movements and expressions need not always be same. So authentication using this method is not reliable. Section 3 SYSTEM ARCHITECTURE Fig 3a System Architecture 3.1 Device authentication and group authentication Each device in a group should be registred from the seedbox separately. Once the registration is successful each device will be having preshared key within it. When two devices trying to communicate for any data exchange thenweshould allow only those devices within the group using nonce process. So that even though devices are “authenticated, it requiresto authorise” for data exchange. This isshowninthe figure Fig 3a.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1104  Seedbox performs Group Creation in that process, admin should give Group name & Group key and for each group,’N’ number of polynomials will be generated.  Seedbox is responsible to view requests and take appropriate action.  Client node send a registration request for a particular group to seedbox/admin by providing its MACID,Owner Name and Group Name.  Once the node approved for a particular group by the seedbox and get its key-value pairs, a node should be authorized to communicate with another node which is of same group. 3.2 User authentication  Through login id and password, user authentication is done. 3.3 Modules used The proposed mechanism should be placed between the internal system (e.g. software application) and the external communication (e.g. wireless interfaces), as a security middleware. The figure 3a shows the architecture of the proposed mechanism and its internal building blocks.  The Seed Box is a storage unit responsible toholdall known pre-shared keys kn, where each kn corresponds to one different secure cluster. Eachkn receives a mnemonic name, assigned by the device’s owner, to be easily associated to a secure cluster.  The I/O is the building block responsible for the communication of the mechanism with the network communication interfaces (the layer just below the mechanism).  The Control Unit involves the functions, wherein a device enrolls itself for authentication (which involves nonce process which means generation of an arbitrary number called cipher text) for the purpose of communication.  Shamir’s Secret Sharing (SSS) implementation for secure key, authentication and Validation process.  One Time password (OTP) is used to generate a challenge message.  For encryption and decryption we use Symmetric Ciphering. Section 4 HARDWARE AND SOFTWARE REQUIREMENTS 4.1 Hardware requirements  2GB RAM  80GB Hard disk  Pentium IV and above processor  At least 4 machines , 1 for administrator, 2 from one group cluster and another from different group cluster 4.2 Software requirements  Operating System: Windows Version  Software: Visual Studio 2010  Language: C#  Application: Windows Forms Section 5 SYSTEM DESIGN System design is the process of defining the architecture, components, modules, interfaces, and data for a system satisfy specified requirements. It implies a systematic and rigorous approach to design. Fig.5a System design In the beginning the device requests for the registration as shown in the figure Fig 4.1 by sending its MAC id, group name to which it wants to join.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1105  Resource manager manually checks for presence of the device  If device is present then he sends he is approval to the device indicating that it is registered. Seed box contains the pre shared sets along with the unique pre shared key for a particular group.  Once the device is registered for a particular group, seed box gives the pre shared set using which pre shared key has to be generated.  Another device say D2 which is also registered sends the request for communication, with this device say D1 as shown in the figure Fig 4.1.  D1 generates the one time password(OTP)  This OTP generated is encrypted using the pre shared key to form cipher text.  D1 sends the Cipher text to D2 ,D2 using its own pre shared sets generates pre shared key.  Then using the preshared key cipher text is decrypted and it is sent back to D1.  D1 checks if received message is equal to its own message. If same, two devices are allowed to communicate further. Section 6 IMPLEMENTATION System implementation is that stage of development life cycle, when the theoretically designed system is turned in actual working system. This phase is very critical so it must be carefully planned and controlled. Otherwise it can cause chaos. All possible constraints must be taken into consideration before implementing the system because the new system must assure the users about its effective working. 6.1. Modules Implementation Our project is divided into two main sub parts or divisions- Node, Seed box. 6.1.1 Group Creation At the server side the admin can create the different groups along with its secret key. Fig 6.1.1a Seed box Operations Snapshot Fig 6.1.1b Group Creation Snapshot 6.1.2 Remote Registration In the beginning the device requests for the registration by sending itsMAC id, group name to which it wantstojoin.This information is sent to seed box or admin for the approval. Fig 6.1.2a Node Remote Registration Snapshot
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1106 6.1.3 View Request The admin can view the pending request and can either approve, reject, delete the request. Fig 6.1.3a View Request Snapshot 6.1.4 Join Group Join Group screen displays list of IP address and corresponding group name. The Group Joining process is done between the two nodes which are in same group and without the interaction of SEEDBOX or ADMIN. Clicking on the IP address of the device allows the further communication with it. Fig 6.1.4a Join Group Snapshot Section 7 CONCLUSION The authentication mechanism provided eases out the work of the people who spend a lot of time in monitoring their devices. The proposed mechanism thwarts security attacks, such as Man in the Middle (MitM) and replay attacks. The proposed mechanism is not only an ad hoc networks secure solution, and can be set on any kind of computer networks, offering a light and distributed security solution BIBLIOGRAPHY 1.Borisov, N. Goldberg, I. and Wagner, D. (2001),Intercepting Mobile Communications: the insecurity of 802.11. In: International Conference on Mobile Computing and Networking - MobiCom’01. Proceedings. Roma, Italia. 2. Bosselaers, A., Govaerts, R. and Vandewalle, J. (1996),Fast Hash on the Pentium. In: Advances in Cryptology - CRYPTO’96, Lecture Notes inComputer Science, Springer- Verlag, and Proceedings. Santa Barbara, CA, USA. 3. Capkun, S., Hubaux, J.P. and Buttyan, L. (2003), Mobility Helps Security in Ad Hoc Networks - MOBIHOC’03,4. Proceedings. Annapolis, MD, USA. 4. Feeney, L. and Nilsson, M. (2001), Investigating theEnergy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment. In: IEEE Infocom’01, 20. Proceedings. Anchorage, AL, USA. 5. Harkins, D. and Carrel, D. (1998), RFC 2409. The Internet Key Exchange (IKE). IETF Network Working Group Request for Comments. 6. Krawczyk, H., Bellare, M. and Canetti, R. (1997), RFC 2104. HMAC: Keyed-Hashing for Message Authentication. IETF Network Working Group Request for Comments. 7. RSA Security Inc. (2001), RSA SecurID Authentication: a better value for a better ROI. RSA Whitepaper. Available at: <http://www.rsasecurity. com/ products/securid/>. 8. Schmidt, B. Schimmler, M. and Adi, W. (2002), Area Efficient Modular Arithmetic for Mobile Security. In: International Conference on Wireless Networks - ICWN’02. Las Vegas: CSREA Press. Proceedings. Las Vegas,NV, USA. p.208-214. 9. Stajano, F. and Anderson, R. (1999), The resurrecting duckling: security issues for ad hoc wireless networks. In:AT&T Software Symposium, 3., Middletown. Proceedings. NJ, USA. 10. Applications and the Internet Workshops, 2007. SAINT Workshops 2007. International Symposium [15-19 Jan. 2007] 11. Advanced Video and Signal-Based Surveillance (AVSS), 2012 IEEE Ninth International Conference.