Journal - Volume I No.1 August 2014

  • » Back to Index

  • Title

    :

    CONDITIONAL PRIVACY PROTOCOL TO OVERCOME SECURITY THREATS IN WIRELESS NETWORK TRANSACTIONS

    Authors

    :

     B.T.Geetha, V.Perumal

    Keywords

    :

    NFC security, Pseudonym, Unsinkability, Conditional privacy protection.

    Issue Date

    :

    July – 2014

    Abstract

    :

    Even with several technological developments and security protocols, the wireless network transaction is still not in safe waters. Today we come across several frauds related to this wireless network transactions, the main reason for this is that user data like passwords, account numbers and other private information of the user is accessed by unauthorized persons .The permanent solution to this to protect the user privacy, to secure the users confidential information from the grasps of the hackers by developing a foolproof protocol. Therefore a new security protocol has to be laid, where user identity is hidden and the public key of the user is secured from the attacks of the hacker. Conditional privacy method using pseudonyms is used to avoid several threatening attacks such as MITM attack (Man-In-The-Middle attack), Eavesdropping and Data modulation in e-payment.

    Page(s)

    :

    53-59

    ISSN

    :

    2347- 4734

    Source

    :

    Vol. 1, No.1

    Download

    :


  • » Back index