CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Towards an Approach for Improved Security in Wireless Networks

Published on March 2013 by T Senthil Kumar, Uppu Sree Priyanka, K Abinaya
International Conference on Innovation in Communication, Information and Computing 2013
Foundation of Computer Science USA
ICICIC2013 - Number 1
March 2013
Authors: T Senthil Kumar, Uppu Sree Priyanka, K Abinaya
f18d0107-02ec-492a-89dc-3ad4cefba762

T Senthil Kumar, Uppu Sree Priyanka, K Abinaya . Towards an Approach for Improved Security in Wireless Networks. International Conference on Innovation in Communication, Information and Computing 2013. ICICIC2013, 1 (March 2013), 23-27.

@article{
author = { T Senthil Kumar, Uppu Sree Priyanka, K Abinaya },
title = { Towards an Approach for Improved Security in Wireless Networks },
journal = { International Conference on Innovation in Communication, Information and Computing 2013 },
issue_date = { March 2013 },
volume = { ICICIC2013 },
number = { 1 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 23-27 },
numpages = 5,
url = { /proceedings/icicic2013/number1/11288-1309/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovation in Communication, Information and Computing 2013
%A T Senthil Kumar
%A Uppu Sree Priyanka
%A K Abinaya
%T Towards an Approach for Improved Security in Wireless Networks
%J International Conference on Innovation in Communication, Information and Computing 2013
%@ 0975-8887
%V ICICIC2013
%N 1
%P 23-27
%D 2013
%I International Journal of Computer Applications
Abstract

For high security transmission over a network, high randomness is required in the seed used for generating a key. This paper deals with two phenomena/methods (a) Bio-metric method (b) Hardware and Software method that possess randomness. Comparison tables have been tabulated with respect to each of the methods. Comparing each source a conclusion is derived at a set of sources that can contribute to the entropy pool.

References
  1. Chris Roberts: PDF: Biometrics 2005
  2. George Landon, Chao Shen, Chengdong Li: PPT: Random number generators.
  3. UmutUludag,SalilPrabhakar: PPT: Biometric Cryptosystems: Issues and Challenges
  4. Anil K. Jain: PPT: Biometric Authentication based on Keystroke Dynamics.
  5. Sanjay Kanade, Danielle Camara, DijanaPetrovska-Delacretaz, and Bernadette Dorizzi:Application of Biometrics to Obtain High Entropy Cryptographic Keys, World Academy of Science,Engineering and Technology 51 2009.
  6. Andy Adler, Richard Youmaran, Sergey Loyka: PPT: Towards a Measure of Biometric Feature Information.
  7. Andy Adler, Richard Youmaran, Sergey Loyka: PPT: Information Content of Biometric Features.
  8. Biometric Newsportal. com,www. biometricnewsportal. com
  9. Biometrics Wikipedia: en. wikipedia. org/wiki/Biometrics/
  10. Robert McEvoy,JamesCurran,PaulCotter,ColinMurphy:Fortuna:Cryptographically Secure Pseudo-Random Number Generation In Software And Hardware.
  11. AurélienFrancillon, Claude Castelluccia: TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes.
  12. Markus Jakobsson, Elizabeth Shriver, Bruce K. Hillyer, Ari Juels:A Practical Secure Physical Random Bit Generator.
  13. vanheusden. com software development,www. vanheusden. com/ved/
Index Terms

Computer Science
Information Sciences

Keywords

Entropy Randomness Random Number Generator Biometrics Seed