IMPLEMENTATION OF WIRELESS NETWORK FROM DENIAL OF SERVICE

Authors

  • Mukesh Kumar Research Scholar, Department of CSE, CBS group of Institutions Jhajhar
  • Pooja Dhankhar assistant professor, Department of CSE, CBS group of institutions jhajhar

Keywords:

transmitter, Communications, Cryptography

Abstract

A wireless network is any type of computer network that uses wireless data connections for connecting network nodes. Wireless networking is a method by which homes, telecommunications networks & enterprise (business) installations avoid costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless personal area networks (WPANs) interconnect devices within a relatively small area, that is generally within a person's reach. For example, both Bluetooth radio & invisible infrared light provides a WPAN for interconnecting a headset to a laptop. ZigBee also supports WPAN applications. Wi-Fi PANs are becoming commonplace (2010) as equipment designers start to integrate Wi-Fi into a variety of consumer electronic devices. A hacker is somebody who exploits & seek weaknesses within a computer network or computer system. A hacker can be motivated by a multitude of reasons, such as profit, challenge or protest. grouping that has evolved everywhere hackers is often referred to as computer underground & these days they are well known community.

References

David Pointcheval, Olivier Blazy, New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange(18_22 august 2013, Santa Barbara, California, USA), Springer-Verlag, LNCS 8042, pages 449_475.

David Pointcheval, Olivier Blazy, Effcient UC-Secure Authenticated Key-Exchange for Algebraic Languages(26 February - 1 March 2013, Nara, Japan)), 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC '13)Springer-Verlag, Kaoru Kurosawa Ed., Springer-Verlag, 2013.

David Pointcheval, Password-based Authenticated Key Exchange. (21-23 may 2012, Darmstadt, Germany)Springer-Verlag, LNCS 7293, pages 390-397.

David Pointcheval, Michel Abdalla, Contributory Password-Authenticated Group Key Exchange with Join Capability, (February 14-18, 2011, San Francisco, CA, USA), A. Kiayias Ed. Springer-Verlag, LNCS 6558, pages 142-160.

David Pointcheval, Xavier Boyen, Strong Cryptography from Weak Secrets, (3 – 6 may 2010, Stellenbosch, South Africa), D. Bernstein and T. Lange Eds., Springer-Verlag, LNCS 6055, pages 297–315.

David Pointcheval, Michel Abdalla, Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys, (3-6 May 2010, Stellenbosch, South Africa)), D. Bernstein and T. Lange Eds., Springer-Verlag, LNCS 6055, pages 351-368.

David Pointcheval, Michel Abdalla, Distributed Public-Key Cryptography from Weak Secrets, (18_20 march 2009, Irvine, CA, USA), S. Jarecki and G. Tsudik Eds. Springer-Verlag, LNCS 5443, pages 139_159.

David Pointcheval, Michel Abdalla, Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness, (21 – 25 june 2009, Gammarth, Tunisia) B. Preneel Ed., Springer-Verlag, LNCS 5580, pages 254–271.

Downloads

Published

30-09-2016

How to Cite

Mukesh Kumar, & Pooja Dhankhar. (2016). IMPLEMENTATION OF WIRELESS NETWORK FROM DENIAL OF SERVICE. International Journal for Research Publication and Seminar, 7(7), 87–92. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/943

Issue

Section

Original Research Article