Open Access   Article Go Back

Anonymous and Fast Roaming Authentication Process in Space Information Networks

R. Murugadoss1 , Sanka Mounika2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 498-502, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.498502

Online published on Feb 28, 2019

Copyright © R. Murugadoss, Sanka Mounika . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Murugadoss, Sanka Mounika, “Anonymous and Fast Roaming Authentication Process in Space Information Networks,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.498-502, 2019.

MLA Style Citation: R. Murugadoss, Sanka Mounika "Anonymous and Fast Roaming Authentication Process in Space Information Networks." International Journal of Computer Sciences and Engineering 7.2 (2019): 498-502.

APA Style Citation: R. Murugadoss, Sanka Mounika, (2019). Anonymous and Fast Roaming Authentication Process in Space Information Networks. International Journal of Computer Sciences and Engineering, 7(2), 498-502.

BibTex Style Citation:
@article{Murugadoss_2019,
author = {R. Murugadoss, Sanka Mounika},
title = {Anonymous and Fast Roaming Authentication Process in Space Information Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {498-502},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3694},
doi = {https://doi.org/10.26438/ijcse/v7i2.498502}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.498502}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3694
TI - Anonymous and Fast Roaming Authentication Process in Space Information Networks
T2 - International Journal of Computer Sciences and Engineering
AU - R. Murugadoss, Sanka Mounika
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 498-502
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
224 209 downloads 126 downloads
  
  
           

Abstract

These days, Space info Network (SIN) has been broadly speaking used, in fact, on account of its favorable circumstances of conveyancing anywhere whenever. This part is prompting another pattern that customary remote purchasers can wander to SIN to induce a superior administration. Be that because it could, the highlights of uncovered connections and better flag dormancy in SIN build it arduous to structure a protected and fast wandering verification plot for this new pattern. Albeit some current investigates are focused around designing secure validation conventions for SIN or giving rambling confirmation conventions to customary remote systems, these plans cannot offer adequate stipulations to the wandering correspondence in SIN and find basic problems, for instance, protection spillage or deplorable verification delay. looking at these problems haven`t been all around attended, we have a tendency to structure a mysterious and fast wandering confirmation conspire for SIN. In our arrange, we have a tendency to use the gathering mark to offer the secrecy to wandering purchasers, and expect that the satellites have restricted process limit and influence them to possess the characterised validation capability to keep up a strategic distance from the constant contribution of the house system management focus (HNCC) whereas confirming the rambling purchasers. the results of security and execution examination demonstrate that the projected arrange will offer the specified security highlights, whereas giving a touch validation delay.

Key-Words / Index Term

Access validation, secrecy, meandering, and space data organize

References

[24] I. Memon, M. R. Mohammed, R. Akhtar, H. Memon, M. H. Memon, and R. A. Shaikh, “Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC),” Wireless personal communications, vol. 79, no. 1, pp. 661–686, 2014.