CFP last date
20 December 2024
Reseach Article

Towards an Approach for Improved Security in Wireless Networks

Published on March 2013 by T Senthil Kumar, Uppu Sree Priyanka, K Abinaya
International Conference on Innovation in Communication, Information and Computing 2013
Foundation of Computer Science USA
ICICIC2013 - Number 1
March 2013
Authors: T Senthil Kumar, Uppu Sree Priyanka, K Abinaya
f18d0107-02ec-492a-89dc-3ad4cefba762

T Senthil Kumar, Uppu Sree Priyanka, K Abinaya . Towards an Approach for Improved Security in Wireless Networks. International Conference on Innovation in Communication, Information and Computing 2013. ICICIC2013, 1 (March 2013), 23-27.

@article{
author = { T Senthil Kumar, Uppu Sree Priyanka, K Abinaya },
title = { Towards an Approach for Improved Security in Wireless Networks },
journal = { International Conference on Innovation in Communication, Information and Computing 2013 },
issue_date = { March 2013 },
volume = { ICICIC2013 },
number = { 1 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 23-27 },
numpages = 5,
url = { /proceedings/icicic2013/number1/11288-1309/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovation in Communication, Information and Computing 2013
%A T Senthil Kumar
%A Uppu Sree Priyanka
%A K Abinaya
%T Towards an Approach for Improved Security in Wireless Networks
%J International Conference on Innovation in Communication, Information and Computing 2013
%@ 0975-8887
%V ICICIC2013
%N 1
%P 23-27
%D 2013
%I International Journal of Computer Applications
Abstract

For high security transmission over a network, high randomness is required in the seed used for generating a key. This paper deals with two phenomena/methods (a) Bio-metric method (b) Hardware and Software method that possess randomness. Comparison tables have been tabulated with respect to each of the methods. Comparing each source a conclusion is derived at a set of sources that can contribute to the entropy pool.

References
  1. Chris Roberts: PDF: Biometrics 2005
  2. George Landon, Chao Shen, Chengdong Li: PPT: Random number generators.
  3. UmutUludag,SalilPrabhakar: PPT: Biometric Cryptosystems: Issues and Challenges
  4. Anil K. Jain: PPT: Biometric Authentication based on Keystroke Dynamics.
  5. Sanjay Kanade, Danielle Camara, DijanaPetrovska-Delacretaz, and Bernadette Dorizzi:Application of Biometrics to Obtain High Entropy Cryptographic Keys, World Academy of Science,Engineering and Technology 51 2009.
  6. Andy Adler, Richard Youmaran, Sergey Loyka: PPT: Towards a Measure of Biometric Feature Information.
  7. Andy Adler, Richard Youmaran, Sergey Loyka: PPT: Information Content of Biometric Features.
  8. Biometric Newsportal. com,www. biometricnewsportal. com
  9. Biometrics Wikipedia: en. wikipedia. org/wiki/Biometrics/
  10. Robert McEvoy,JamesCurran,PaulCotter,ColinMurphy:Fortuna:Cryptographically Secure Pseudo-Random Number Generation In Software And Hardware.
  11. AurélienFrancillon, Claude Castelluccia: TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes.
  12. Markus Jakobsson, Elizabeth Shriver, Bruce K. Hillyer, Ari Juels:A Practical Secure Physical Random Bit Generator.
  13. vanheusden. com software development,www. vanheusden. com/ved/
Index Terms

Computer Science
Information Sciences

Keywords

Entropy Randomness Random Number Generator Biometrics Seed