Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Certain Investigations of Security Algorithms and its Vulnerabilities for Wireless Networks

Published on March 2013 by M. Malathi, G. M. Kadhar Nawaz
International Conference on Innovation in Communication, Information and Computing 2013
Foundation of Computer Science USA
ICICIC2013 - Number 2
March 2013
Authors: M. Malathi, G. M. Kadhar Nawaz
3cd5dd18-288f-43e8-8369-95294f4222b8

M. Malathi, G. M. Kadhar Nawaz . Certain Investigations of Security Algorithms and its Vulnerabilities for Wireless Networks. International Conference on Innovation in Communication, Information and Computing 2013. ICICIC2013, 2 (March 2013), 12-17.

@article{
author = { M. Malathi, G. M. Kadhar Nawaz },
title = { Certain Investigations of Security Algorithms and its Vulnerabilities for Wireless Networks },
journal = { International Conference on Innovation in Communication, Information and Computing 2013 },
issue_date = { March 2013 },
volume = { ICICIC2013 },
number = { 2 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 12-17 },
numpages = 6,
url = { /proceedings/icicic2013/number2/11293-1351/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovation in Communication, Information and Computing 2013
%A M. Malathi
%A G. M. Kadhar Nawaz
%T Certain Investigations of Security Algorithms and its Vulnerabilities for Wireless Networks
%J International Conference on Innovation in Communication, Information and Computing 2013
%@ 0975-8887
%V ICICIC2013
%N 2
%P 12-17
%D 2013
%I International Journal of Computer Applications
Abstract

Wireless networks is a collection of nodes that communicate in a open-ended manner. The communication among the nodes allow users to communicate from different places in a boundary. However , this forces lots of challenges for the users as the packets pass in a wireless medium and can overlap with other transmissions. This has been the key factor for this survey presented in this paper. The security algorithms exist separately and can be combined with network model leading to different security protocol standards. This paper provides research direction for security algorithms considering the behavioral aspects of the users namely keyboard dynamics. A complete survey has been presented considering the keyboard dynamics analyzing how it can be combined with the security algorithms. A broad variety of applications have been analyzed and the suggestions have been presented. A complete list of performance parameters also have been listed at the end of the survey. The paper provides a list of directions for using neural approaches for authenticating users with keyboard dynamics.

References
  1. Benzamin Arazi ,ITSHAK DEINSTEIN,ODED KAFRI,"Intiution Perception And Secure Communication", IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, VOL. 19, NO. 5, SEPTEMBER/OCTOBER 1989
  2. T. Kiesler, L. Harn, " Cryptographic Master-Key-Generation Scheme And Its Application To Public Key Distribution", IEE PROCEEDINGS-E, Vol. 139, No. 3, MAY 1992
  3. R. J. Anderson," PRACTICAL RSA TRAPDOOR", ELECTRONICS LETTERS 27th Mav 1993 Vol. 29 No. 11
  4. Vlad. M. Sidelnikov , 'Exponentiat Ion-Based Key Generation Using Noncommutat Ive Groups",IEEE,1994
  5. Raymond W. Woo And Cyril Leung," A New Key Generation Method For Frequency-Domain Speech Scramblers", IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 45, NO. 7, JULY 1997.
  6. R. Poovendran, M. S. Corson, J. S. Baras," A DISTRIBUTED SHARED KEY GENERATION PROCEDURE USING FRACTIONAL KEYS", IEEE,1998.
  7. G. J . Simmons, Llainn Troduction To Shared Secret And/Or Shared Control Schemes And Their Applications", G. J. Simmons, Editor, Contemporary Cryptology: The Science Of Information Integrity, 441-497, IEEE Press, 1992.
  8. Ueli M. Maurer, Stefan Wolf," Unconditionally Secure Key Agreement And The Intrinsic Conditional Information", IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 2, MARCH 1999
  9. W. Diffie And M. Hellman. "New Directions In Cryptography",IEEE Trans. Inform. Theory IT-22, 6 Nov. 1976, 644-654
  10. D. Bressoud, "Factorization And Primality Testing, Berlin:Springer-Verlag, 1989
  11. A. Abdul-Rahman, S. Hailes. "A Distributed Trust Model",New Security Paradigms Workshop, Great Landale, UK. 1997.
  12. R. Yahalom, B. Klein. T. Beth. "Trust Relationships In Secure Systems - A Distributed Authentication Perspective. Proceedings Of The IEEE Symposium On Research In Security And Privacy, 1993.
  13. Imre Csiszár," Common Randomness And Secret Key Generation With A Helper", IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 2, MARCH 2000
  14. Richard J. Hughes, William T. Buttler, Paul G. Kwiat, Steve K. Lamoreaux,University Of Califomia," Quantum Cryptography For Secure Satellite Communications",IEEE,2000.
  15. Bin Sun,Wade Trappe, Yan Sun And K. J. Ray Liu," A Time-Efficient Contributory Key Agreement Scheme For Secure Group Communications",IEEE,2002.
  16. Daniel Gottesman And Hoi-Kwong Lo," Proof Of Security Of Quantum Key Distribution With Two-Way Classical Communications", IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 2, FEBRUARY 2003.
  17. B. Martin, P. Isokoski, F. Jayet, T. Schang, "Performance Of Finger-Operated Soft Keyboard With And Without Offset Zoom On The Pressed Key," Proceedings Of The 6th International Conference On Mobile Technology, Application & Systems, Nice, France, 2009.
  18. J. Goodman, G. Venolia, K. Steury, C. Parker, "Language Modeling For Soft Keyboards," Proceedings Of The 7th International Conference On Intelligent User Interfaces, January 13-16, 2002, San Francisco, California, USA.
  19. P. Isokoski, "Performance Of Menu-Augmented Soft Keyboards," Proceedings Of The SIGCHI Conference On Human Factors In Computing Systems, P. 423-430, April 24-29, 2004, Vienna, Austria.
  20. I. S. Mackenzie, S. X. Zhang, And R. W. Soukoreff, "Text Entry Using Soft Keyboards," Behaviour & Information Technology, 18, 235--244, 1999.
  21. Pekka Parhi , Amy K. Karlson , Benjamin B. Bederson, "Target Size Study For One-Handed Thumb Use On Small Touchscreen Devices," Proceedings Of The 8th Conference On Human Computer Interaction With Mobile Devices And Services, September 12-15, 2006, Helsinki, Finland.
Index Terms

Computer Science
Information Sciences

Keywords

Feature Vector keyboard Dynamics keystroke Keying Patterns Keylength