The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Wireless Client Server Application Model Using Limited Key Generation Technique
Abstract
In this article we implement a client server model using limited-used key generation scheme (Kungpisdan, Le, & Srinivasan, 2004) to generate a set of session keys that are never transmitted, which means that there is no chance for the attacker to sniff the packets and retrieve keys while they are being transmitted. These session keys are used for encrypting and hashing the data to be transmitted from mobile client device to the servers in wired network and vice versa. The updating of the session keys used in this technique does not rely on any long-term shared key, instead the process is based upon the last session key used. This technique of elevating the frequency of the key update to the next possible level makes the system much more secure than the other present techniques. In addition to providing better security, this technique also enhances the performance of a limited resource device by avoiding the repeated generation of keys on it.
Related Content
Tapan Kumar Behera.
© 2023.
20 pages.
|
B. Narendra Kumar Rao.
© 2023.
17 pages.
|
Blendi Rrustemi, Deti Baholli, Herolind Balaj.
© 2023.
18 pages.
|
Alma Beluli.
© 2023.
11 pages.
|
Jona Ndrecaj, Shkurte Berisha, Erita Çunaku.
© 2023.
15 pages.
|
Yllka Totaj.
© 2023.
12 pages.
|
Hla Myo Tun, Devasis Pradhan.
© 2023.
31 pages.
|
|
|