Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Data Security in a Distributed Wireless Network System


Affiliations
1 Information Technology Department, J J College of Engineering and Technology, Trichirappalli-9, Tamilnadu, India
2 J J College of Engineering and Technology, Trichirappalli-9, Tamilnadu, India
     

   Subscribe/Renew Journal


In wireless network data transfer is a secure one, because the intruders may use duplicate IP addresses to hack the confidential data. Hop-by-hop authentication is necessary for secured communication. Hop-by-hop authentication is obtained by MAC address lookup table. The main goal of this work to protect contents of sensor data from attackers, including external intruders and unauthorized network users. For this purpose, we need to define and enforce a flexible access policy for each individual user based on the user’s role in the system. In particular, the access policy should be able to define a unique set of data that the user is authorized to access, and must be enforced via a cryptographic method since sensor nodes are vulnerable to strong attacks.

Keywords

IP Address, Lookup Table, Authentication, Cryptographic Method.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 149

PDF Views: 2




  • Data Security in a Distributed Wireless Network System

Abstract Views: 149  |  PDF Views: 2

Authors

S. Beski Prabaharan
Information Technology Department, J J College of Engineering and Technology, Trichirappalli-9, Tamilnadu, India
S. Senthil Murugan
J J College of Engineering and Technology, Trichirappalli-9, Tamilnadu, India
K. Vivek
J J College of Engineering and Technology, Trichirappalli-9, Tamilnadu, India
M. Velmurugan
J J College of Engineering and Technology, Trichirappalli-9, Tamilnadu, India

Abstract


In wireless network data transfer is a secure one, because the intruders may use duplicate IP addresses to hack the confidential data. Hop-by-hop authentication is necessary for secured communication. Hop-by-hop authentication is obtained by MAC address lookup table. The main goal of this work to protect contents of sensor data from attackers, including external intruders and unauthorized network users. For this purpose, we need to define and enforce a flexible access policy for each individual user based on the user’s role in the system. In particular, the access policy should be able to define a unique set of data that the user is authorized to access, and must be enforced via a cryptographic method since sensor nodes are vulnerable to strong attacks.

Keywords


IP Address, Lookup Table, Authentication, Cryptographic Method.