CFP last date
20 January 2025
Reseach Article

Security Authorization for MAC Address under Distributed Environment

by Kenam Verma, Rashmi Singh, Vipin Saxena
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 131 - Number 12
Year of Publication: 2015
Authors: Kenam Verma, Rashmi Singh, Vipin Saxena
10.5120/ijca2015907381

Kenam Verma, Rashmi Singh, Vipin Saxena . Security Authorization for MAC Address under Distributed Environment. International Journal of Computer Applications. 131, 12 ( December 2015), 21-24. DOI=10.5120/ijca2015907381

@article{ 10.5120/ijca2015907381,
author = { Kenam Verma, Rashmi Singh, Vipin Saxena },
title = { Security Authorization for MAC Address under Distributed Environment },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 131 },
number = { 12 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume131/number12/23502-2015907381/ },
doi = { 10.5120/ijca2015907381 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:27:52.919079+05:30
%A Kenam Verma
%A Rashmi Singh
%A Vipin Saxena
%T Security Authorization for MAC Address under Distributed Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 131
%N 12
%P 21-24
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Arrangement of autonomous computer systems is one of the major issues in the distributed computing system. Each machine has its own unique Media Control Access (MAC) address. When the machine is connected across the globe on the Wide Area Network (WAN), intruders can be easily caught by the MAC address of the machine. If one transmits the confidential information from one device to another device then it is very important for safe delivery of the information with secure transmission of MAC address, so that intruders could not break the MAC address. In the present work, an approach for secure transmission of information along with the MAC address is depicted with well known Rivest, Shamir and Adleman (RSA) algorithm of the security system. The algorithm is tested on different MAC addresses of different machines through the object-oriented programming JAVA language. Before implementation, Unified Modeling Language (UML) approach is used to build a cryptosystem model.

References
  1. R.L.Rivest, A. Shamir, and L.M.Adleman.(1978). “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, volume 21, pages 120-126, February.
  2. W.Diffie and M. Hellman. (1978). “New Directions in Cryptography”. IEEE transactions on Information Theory.IT-22.472-492.
  3. Andrew S. Tanenbaum.(1980) “Computer Networks” , Fourth Edition, 2003.
  4. Milan Milenkovic.(1987). “Operating System: Concepts and Design”, Second Edition, 1992.
  5. Cetin Kaya Koc. (1994). High speed RSA implementation, RSA Laboratories, CA.
  6. OMG (Object Management Group): Object Management Architecture Reference Model. (1995).
  7. OMG (Object Management Group): Unified Modeling Language (UML) Reference Model. (1995).
  8. David Pointcheval and Jacques Stern. (1996). Security proofs for signature schemes, EUROCRYPT’96, Zaragoza, Spain.
  9. W.Stallings. (1998). “Cryptography and Network Security”, Third Edition, 2006.
  10. Anand Krishnamurthy, Yiyan Tang, Cathy Xu and Yuke Wang. (2002). An efficient implementation of multi-prime RSA on DSP processor, University of Texas, Texas, USA.
  11. Grady Booch, Robert A. Maksimchuk,Michael W. Engle ,Bobbi J. Young, Jim Conallen, Kelli A. Houston.“Object-Oriented Analysis and Design with Applications “, Third Edition, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Distributed Computing Media Control Access Wide Area Network Unified Modeling Language Cryptosystem.