Tuesday, May 5, 2020

Private Connection Two Connecting Devices †Myassignmenthelp.Com

Questions: What research question does the paper address? What was the conclusion of the research? Answers: Introducation The paper mainly addresses an approach which is implemented in order to achieve a secured and private connection between two connecting devices by means of shaking them together (Bichler et al. 2007). In this paper the main concept is to generate a cryptographic key with the help of measuring acceleration data on devices which are small hand held. The main aspect is to provide a connection between two devices in a secured manner. This result in communication between two devices in a secured manner without any third party involved in the process of communication. The main aspect is to keep the communication data secured from the threads involved in usual communication aspect between any two pair of communicating device (Bichler et al. 2007). The process used in order to generate such a communication which is secured is done by shaking the devices together. The outcome is that both the devices experience same acceleration over time as a result of which genarration of cryptographic key is achieved without interference between two coonected device (Zou and Weng 2017). An algorithm is used in order to achieve key generation which is based on pair wise quantization of nearest neighbor in order to achieve the cryptographic key. The cryptographic key plays a vital role in order to achieve a secure connection without any security aspects and bugs involved in it. Practical experiments aided with relation to genie-aided-synchronization and offline computation have shown increased success rate which is approximately 80%, with an average entropy key of 13 bit which can be generated with it. This process can easily step aside the security aspect involved in communication (Bichler et al. 2007). References Bichler, D., Stromberg, G., Huemer, M. and Lw, M., 2007. Key generation based on acceleration data of shaking processes. UbiComp 2007: Ubiquitous Computing, pp.304-317. Zou, J. and Weng, T., 2017. A New Image Encryption Instant Communication Method Based On Matrix Transformation. In Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Nov., 21-23, 2016, Kaohsiung, Taiwan, Volume 1 (pp. 321-329). Springer International Publishing.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.