Enhancement of Adhoc Wireless network Security by Customized Encryption Technology & using Multilayer of Security

Authors

  • Sumit Tuteja Research Scholar, Geeta Engineering College, Naultha Panipat
  • Mr. Nikhil Sharma Assistant Professor , Geeta Engineering College, Naultha Panipat

Keywords:

pioneering, Lack, Wireless

Abstract

Ad-hoc Wireless computing proposes new ways to provide services. These pioneering technical & pricing opportunities bring changes within way business operated. Lack of security is only barrier within wide adoption of Wireless Computing. The fastest development in Wireless computing has brought many security issues and challenges for users. Wireless computing offers many benefits, but it is also vulnerable to threats.

References

Gast, Matthew S., 2005, 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, O’Reilly Media, Inc., Sebastopol, CA, USA, pp. 23-33.

Steve Rockley, 2007, Wireless Network Technology, Elsevier Linacre House, Jordan Hill, Burlington MA.

Benny, H., Kumar, C. S., Deepthi, D.V.V., Rao, S. K., and Raju, G. S.V.P., 2013 “Overcome of Router/Gateway Problems in Wireless Networks”, International Journal on Advanced Computer Theory and Engineering (IJACTE), vol. 2 (5), pp. 66-67.

Wikipedia Contributor’s, 2016, “Wireless Networks”, [online]. Available: https://en.wiki

pedia.org/w/index.php?title=Wireless_network&oldid=721993952. [Accessed May 26, 2016].

C.Siva Ram Murthy and B.S.Manoj, 2004, Ad Hoc Wireless Networks – Architectures and Protocols, Pearson Education, Upper Saddle River, New Jersey.

C.K.Toh, 2002, Ad Hoc Mobile Wireless Networks, Pearson Education, Upper Saddle River, New Jersey.

Kalita, L., 2014, “Socket Programming”, International Journal of Computer Science and Information Technologies, vol. 5 (3), pp. 4802-4807.

Symantec, (2007), “Overview of IP addressing and subnetting”, [Online]. Available: https://support.symantec.com/en_US/article.TECH82138.html [Accessed Feb. 3, 2016].

Kahate, A., 2008, Cryptography and network security, second edition, TataMc Graw-Hill, New Delhi.

Sarvesh Tanwar, Prema K.V., 2013,"Threats & Security Issues in Ad hoc network: A Survey Report”, International Journal of Soft Computing and Engineering (IJSCE), vol.2 (6), pp.138-143.

Aggarwal,S.,Jaiswal,U.,2011,"Kryptos+Graphein=Cryptography”, Internation al Journal of Engineering Science and Technology (IJEST), vol. 3 (9), pp. 7080-7084.

Vahed, A., AL., and Sahhavi, H., 2011, “An overview of modern cryptography”, World Applied Programming, vol. 1 (1), pp. 55-61.

RIVEST, R.L., SHAMIR, A., and ADLEMAN, L., 1978, “A method for obtaining digital signatures and public-key cryptosystems”, CACM, vol. 21(2), pp. 120-126

Downloads

Published

30-09-2016

How to Cite

Sumit Tuteja, & Mr. Nikhil Sharma. (2016). Enhancement of Adhoc Wireless network Security by Customized Encryption Technology & using Multilayer of Security. International Journal for Research Publication and Seminar, 7(6), 143–148. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/924

Issue

Section

Original Research Article