For Queries/Clarification

alameenpublications@gmail.com

e-ISSN 2455-9288

Why publish with

ijaser

IJASER publishes high-quality, original research papers, brief reports, and critical reviews in all theoretical, technological, and interdisciplinary studies that make up the fields of advanced science and engineering and its applications.

SECURE KEY AGREEMENT AND KEY PROTECTION FOR MOBILE DEVICES USER AUTHENTICATION

Abstract

Inspite of the advances in the hardware for mobile held devices and resource-intensive applications still they requires a large computation and storage capabilities. Recent research has attempted to address these issues by employing remote servers, such as Networks and peer mobile devices. For mobile devices that are deployed in the dynamic networks with frequent topologies changes due to node failure/unavailability and mobility as in a mobile Network however, the challenges of reliability and energy efficiency were largely unaddressed.
To our knowledge, we are the first to address these issues and challenges in an integrated manner for both the data storage and processing the data in mobile Network, an approach we call k-out-of-n computing. In our solution, mobile devices were successfully retrieve or process the data , in most efficient way, same as k out of n algorithm remote servers are accessible. along with the real system implementation we prove the feasibility of our approach. The extensive simulations describes the fault tolerance mechanism and energy efficiency performance of our framework in an larger networks.

Author

Ms.T.Nithya1,Ms.N.Priyamathi 2, Ms.S.Ranjith3, Ms, V.Shee Dhasiya4, Ms. K.Vishnupriya5
Download