Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Relative Schemes for Authenticating Decentralized High Dense Mobile Networks


Affiliations
1 Department of Information Technology, Nehru Arts and Science College, India
2 Department of Computer Science, Nehru Arts and Science College, India
     

   Subscribe/Renew Journal


Wireless Mobile networks are more vulnerable due to its frequent topological changes. Authenticating mobile nodes in such network are more difficult. Sometimes it’s very tougher when the mobile nodes are in high dense. Cryptographic keys are utilized to send the security for the decentralized wireless systems. It is extremely vital to embrace for the dynamic and high portability systems. Several approaches and strategies have proposed to handle many security issues in wireless mobile networks. To build up another fruitful technique needs a total survey and issues of existing validation and security strategies in wireless mobile systems. This paper gives an extensive investigation and overview of the recent mobile authentication strategies.

Keywords

Wireless Mobile Networks, Security, Decentralized Mobile Network, Pre-Key Distribution, Collaborative Authentication.
User
Subscription Login to verify subscription
Notifications
Font Size


  • A Relative Schemes for Authenticating Decentralized High Dense Mobile Networks

Abstract Views: 314  |  PDF Views: 0

Authors

P. K. Manoj Kumar
Department of Information Technology, Nehru Arts and Science College, India
K. S. Arya
Department of Computer Science, Nehru Arts and Science College, India

Abstract


Wireless Mobile networks are more vulnerable due to its frequent topological changes. Authenticating mobile nodes in such network are more difficult. Sometimes it’s very tougher when the mobile nodes are in high dense. Cryptographic keys are utilized to send the security for the decentralized wireless systems. It is extremely vital to embrace for the dynamic and high portability systems. Several approaches and strategies have proposed to handle many security issues in wireless mobile networks. To build up another fruitful technique needs a total survey and issues of existing validation and security strategies in wireless mobile systems. This paper gives an extensive investigation and overview of the recent mobile authentication strategies.

Keywords


Wireless Mobile Networks, Security, Decentralized Mobile Network, Pre-Key Distribution, Collaborative Authentication.

References