International Conference on Innovation in Communication, Information and Computing 2013 |
Foundation of Computer Science USA |
ICICIC2013 - Number 2 |
March 2013 |
Authors: M. Malathi, G. M. Kadhar Nawaz |
3cd5dd18-288f-43e8-8369-95294f4222b8 |
M. Malathi, G. M. Kadhar Nawaz . Certain Investigations of Security Algorithms and its Vulnerabilities for Wireless Networks. International Conference on Innovation in Communication, Information and Computing 2013. ICICIC2013, 2 (March 2013), 12-17.
Wireless networks is a collection of nodes that communicate in a open-ended manner. The communication among the nodes allow users to communicate from different places in a boundary. However , this forces lots of challenges for the users as the packets pass in a wireless medium and can overlap with other transmissions. This has been the key factor for this survey presented in this paper. The security algorithms exist separately and can be combined with network model leading to different security protocol standards. This paper provides research direction for security algorithms considering the behavioral aspects of the users namely keyboard dynamics. A complete survey has been presented considering the keyboard dynamics analyzing how it can be combined with the security algorithms. A broad variety of applications have been analyzed and the suggestions have been presented. A complete list of performance parameters also have been listed at the end of the survey. The paper provides a list of directions for using neural approaches for authenticating users with keyboard dynamics.