A Secure Service Key sharing Approach for Authorized Service Access in Wireless Network Services
D.V. Srihari Babu1, Govardhan Reddy Kamatam2, K. Ayyanna3
1D.V. Srihari Babu, Assistant Professor, Department of ECE, GPREC, Kurnool (Andhra Pradesh), India.
2Govardhan Reddy Kamatam, Associate Professor, Department of CSE, GPREC, (Andhra Pradesh), India.
3K. Ayyanna, Assistant Professor, Department of ECE, GPREC, Kurnool (Andhra Pradesh), India.
Manuscript received on 23 March 2019 | Revised Manuscript received on 04 April 2019 | Manuscript Published on 18 April 2019 | PP: 334-340 | Volume-7 Issue-6S March 2019 | Retrieval Number: F02660376S19/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The development of Wireless Network Services (WNS) makes it simple for users to share information and computing competence with their hosts. User recognition is a fundamental access control method for client-server networking architectures. Recognition of single sign-on (SSO) agrees to rightful users to access other service providers on WNS by means of a one session key for a session. Currently, numerous user recognition approaches have been recommended for accessing WNS. Unfortunately, existing schemes cannot sustain user secrecy while the common expected attacks occur. In addition, for more period management mechanisms they utilize to be able to outcome in extensive overhead outlay. To prevail over these inadequacies, we propose a Secure Service Key (SSK) shared approach for authenticated service access in wireless network services. This approach initially implements a method for generating a secure encryption key to validate user login authentication and a mechanism for generating the SSK for service access at a later time. Generate a new security service key (N-SSK) for all service conversions to maintain reliability. Measure the execution time and overhead of various processes to assess on-the-fly and effects. The result is instant access to security service access.
Keywords: Wireless Network, Service Key, Sharing, Authorized Service Access.
Scope of the Article: Network Protocols & Wireless Networks