Open Access
Subscription Access
Open Access
Subscription Access
Data Security in a Distributed Wireless Network System
Subscribe/Renew Journal
In wireless network data transfer is a secure one, because the intruders may use duplicate IP addresses to hack the confidential data. Hop-by-hop authentication is necessary for secured communication. Hop-by-hop authentication is obtained by MAC address lookup table. The main goal of this work to protect contents of sensor data from attackers, including external intruders and unauthorized network users. For this purpose, we need to define and enforce a flexible access policy for each individual user based on the user’s role in the system. In particular, the access policy should be able to define a unique set of data that the user is authorized to access, and must be enforced via a cryptographic method since sensor nodes are vulnerable to strong attacks.
Keywords
IP Address, Lookup Table, Authentication, Cryptographic Method.
User
Subscription
Login to verify subscription
Font Size
Information
Abstract Views: 233
PDF Views: 2