|
|
(18.226.52.173)
|
Users online: 5000
|
|
|
|
|
|
Ijournet
|
|
|
|
|
Securing Multi Key Cryptography Policy based Session Authorized Access in Wireless Broad Cast Network Geetha D.*, Dr. Sakthivel S.** *Research Scholar, Assistant Professor, Adhiyamaan College of Engineering, Hosur, India **Professor, Sona College of Technology, Salem, India Online published on 15 September, 2016. Abstract A wireless Broadcast communication system is the most significant and security needs in established communication model for authorization. Securing the broadcast network from the conflict is critical issue for broad cast environment. The cryptography standard provides randomize key assumption procedure to the systematic with the recent adoption of elliptic curve cryptography and diffusion of the broadcast network prototype in distributed systems such as wireless broadcast networks, there have been rapidly increasing demands and concerns for distributed data security. To propose a novel multi key policy scheme for a data allocation system by exploiting the attribute of the system construction. The projected scheme features achieve the security difficulty could be solved by multi attribute key issuing in wireless broadcast at the session that verifies using key policy algorithm which is constructed using the secure auditing computation between the key generation in session time and the data storing center and user revocation per each characteristic could be done by alternate encryption which takes advantage of the discriminating attribute group key distribution on crypto analysis. The security analysis of key performance indicates that the RBAC method is efficient to securely supervise the data distributed in the data allotment system. Top Keywords Wireless broadcast network, KP-ABE, role based access, crypto analysis. Top | |
|
|
|
|
║ Site map
║
Privacy Policy ║ Copyright ║ Terms & Conditions ║
|
|
823,995,098 visitor(s) since 30th May, 2005.
|
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
|
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.
|