Accessing Network Using Secure Android Applications
DOI:
https://doi.org/10.32628/CSEIT195164Keywords:
Cognitive Radio Networks, Primary User, Secondary Users.Abstract
Security plays a vital role in today's mobile world. There are security issues like sniffing of data while accessing information through open channel. Proper security measures can help to deal with the common security threats faced by mobile phone users such as data protection, privacy, application and personal information security. Cryptographic techniques play an important role in protecting communication links and data, since access to data can be limited to those who hold the proper key. This paper discusses a method to securely access information in a network by an android mobile application using AES cryptographic technique. The paper describes a new key sharing algorithm, based on the symmetric key management, for faster and efficient encryption of data that is suitable for use in a mobile device.
References
- A. Ghasemi and E. Sousa, "Collaborative spectrum sensing for opportunistic access in fading environments," in Proc. IEEE DySPAN, 2005, pp. 131-136.
- A. Ghasemi and E. Sousa, "Opportunistic spectrum access in fading channelsthrough collaborative sensing," J. Commun., vol. 2, no. 2, pp. 71-82, Mar. 2007.
- S.Haykin, "Cognitive radio: Brain-empowered wireless communications," IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb. 2005.
- J. Mitola and G. Maguire, "Cognitive radio: Making software radios more personal," IEEE Pers. Commun., vol. 6, no. 4, pp. 13-18, Aug. 1999.
- E. Noon and H. Li, "Defending against hit-and-run attackers in collaborative spectrum sensing of cognitive radio networks: A point system," in Proc. IEEE VTC Spring, 2010, pp. 1-5.
- G. Staple and K. Werbach, "The end of spectrum scarcity," IEEE Spectr., vol. 41, no. 3, pp. 48-52, Mar. 2004.
- H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato, "A survey of trust and reputation management systems in wireless communications," Proc. IEEE, vol. 98, no. 10, pp. 1755-1772, Oct. 2010.
- T. Yucek and H. Arslan, "A survey of spectrum sensing algorithms for cognitive radio applications," IEEE Commun. Surveys Tuts., vol. 11, no. 1, pp. 116-130, 2009.
- W. Wang, H. Li, Y. Sun, and Z. Han, "Catchit: Detect malicious nodes in collaborative spectrum sensing," in Proc. IEEE GLOBECOM, 2009, pp. 1-6.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.