Accessing Network Using Secure Android Applications

Authors

  • R. Gomathyjayam  Assistant Professor, Department of Computer Applications, Bon Secours College for Women, Thanjavur, Tamil Nadu, India
  • R. Thilakavathi  M.Sc., Department of Computer Science, Bon Secours College for Women, Thanjavur, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT195164

Keywords:

Cognitive Radio Networks, Primary User, Secondary Users.

Abstract

Security plays a vital role in today's mobile world. There are security issues like sniffing of data while accessing information through open channel. Proper security measures can help to deal with the common security threats faced by mobile phone users such as data protection, privacy, application and personal information security. Cryptographic techniques play an important role in protecting communication links and data, since access to data can be limited to those who hold the proper key. This paper discusses a method to securely access information in a network by an android mobile application using AES cryptographic technique. The paper describes a new key sharing algorithm, based on the symmetric key management, for faster and efficient encryption of data that is suitable for use in a mobile device.

References

  1. A. Ghasemi and E. Sousa, "Collaborative spectrum sensing for opportunistic access in fading environments," in Proc. IEEE DySPAN, 2005, pp. 131-136.
  2. A. Ghasemi and E. Sousa, "Opportunistic spectrum access in fading channelsthrough collaborative sensing," J. Commun., vol. 2, no. 2, pp. 71-82, Mar. 2007.
  3. S.Haykin, "Cognitive radio: Brain-empowered wireless communications," IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb. 2005.
  4. J. Mitola and G. Maguire, "Cognitive radio: Making software radios more personal," IEEE Pers. Commun., vol. 6, no. 4, pp. 13-18, Aug. 1999.
  5. E. Noon and H. Li, "Defending against hit-and-run attackers in collaborative spectrum sensing of cognitive radio networks: A point system," in Proc. IEEE VTC Spring, 2010, pp. 1-5.
  6. G. Staple and K. Werbach, "The end of spectrum scarcity," IEEE Spectr., vol. 41, no. 3, pp. 48-52, Mar. 2004.
  7. H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato, "A survey of trust and reputation management systems in wireless communications," Proc. IEEE, vol. 98, no. 10, pp. 1755-1772, Oct. 2010.
  8. T. Yucek and H. Arslan, "A survey of spectrum sensing algorithms for cognitive radio applications," IEEE Commun. Surveys Tuts., vol. 11, no. 1, pp. 116-130, 2009.
  9. W. Wang, H. Li, Y. Sun, and Z. Han, "Catchit: Detect malicious nodes in collaborative spectrum sensing," in Proc. IEEE GLOBECOM, 2009, pp. 1-6.

Downloads

Published

2019-02-28

Issue

Section

Research Articles

How to Cite

[1]
R. Gomathyjayam, R. Thilakavathi, " Accessing Network Using Secure Android Applications, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.438-442, January-February-2019. Available at doi : https://doi.org/10.32628/CSEIT195164