Enhancement of Adhoc Wireless network Security by Customized Encryption Technology & using Multilayer of Security
Keywords:
pioneering, Lack, WirelessAbstract
Ad-hoc Wireless computing proposes new ways to provide services. These pioneering technical & pricing opportunities bring changes within way business operated. Lack of security is only barrier within wide adoption of Wireless Computing. The fastest development in Wireless computing has brought many security issues and challenges for users. Wireless computing offers many benefits, but it is also vulnerable to threats.
References
Gast, Matthew S., 2005, 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, O’Reilly Media, Inc., Sebastopol, CA, USA, pp. 23-33.
Steve Rockley, 2007, Wireless Network Technology, Elsevier Linacre House, Jordan Hill, Burlington MA.
Benny, H., Kumar, C. S., Deepthi, D.V.V., Rao, S. K., and Raju, G. S.V.P., 2013 “Overcome of Router/Gateway Problems in Wireless Networks”, International Journal on Advanced Computer Theory and Engineering (IJACTE), vol. 2 (5), pp. 66-67.
Wikipedia Contributor’s, 2016, “Wireless Networks”, [online]. Available: https://en.wiki
pedia.org/w/index.php?title=Wireless_network&oldid=721993952. [Accessed May 26, 2016].
C.Siva Ram Murthy and B.S.Manoj, 2004, Ad Hoc Wireless Networks – Architectures and Protocols, Pearson Education, Upper Saddle River, New Jersey.
C.K.Toh, 2002, Ad Hoc Mobile Wireless Networks, Pearson Education, Upper Saddle River, New Jersey.
Kalita, L., 2014, “Socket Programming”, International Journal of Computer Science and Information Technologies, vol. 5 (3), pp. 4802-4807.
Symantec, (2007), “Overview of IP addressing and subnetting”, [Online]. Available: https://support.symantec.com/en_US/article.TECH82138.html [Accessed Feb. 3, 2016].
Kahate, A., 2008, Cryptography and network security, second edition, TataMc Graw-Hill, New Delhi.
Sarvesh Tanwar, Prema K.V., 2013,"Threats & Security Issues in Ad hoc network: A Survey Report”, International Journal of Soft Computing and Engineering (IJSCE), vol.2 (6), pp.138-143.
Aggarwal,S.,Jaiswal,U.,2011,"Kryptos+Graphein=Cryptography”, Internation al Journal of Engineering Science and Technology (IJEST), vol. 3 (9), pp. 7080-7084.
Vahed, A., AL., and Sahhavi, H., 2011, “An overview of modern cryptography”, World Applied Programming, vol. 1 (1), pp. 55-61.
RIVEST, R.L., SHAMIR, A., and ADLEMAN, L., 1978, “A method for obtaining digital signatures and public-key cryptosystems”, CACM, vol. 21(2), pp. 120-126
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.