Study and Overview of Anti-Trespasser
Keywords:
Bluetooth, Piconet, Ad-hoc, Trespasser, MobileAbstract
In current scenario, security systems remain generic with limited authentication abilities. Existence of such security methods for primary purpose is legitimate. With the growing technology and emergence of malicious people around, it may be possible to break barriers. Safety of one’s precious data is primary concern. This project proposes a security mechanism to enhance the level of security for every individual. The application tries to leverage individual’s presence to be a key to access virtual area. The system requires mobile device with Bluetooth functionality, which is coupled with principle device that you need to secure. The Project aims to tightly couple security mechanism with the operating system allowing it to take final steps to maintain privacy of data.
References
Esteban Alcorn, Bluetooth Architecture Overview”, Microsoft Windows Embedded Compact 7, Published: March 2011, https://www.ieee.org/documents/ieeecitationref.pdf
S.K. Kenue and J.F. Greenleaf, “Limited angle multifrequency diffiaction tomography,” IEEE Trans. Sonics Ultrason., vol. SU-29, no. 6, pp. 213-2 17, July 1982. www.techterms.com/definition/manet
C. Brusaw, C. Aired, and W. Oliu, Handbook of Technical Writing, 3rd ed. New York: St. Martin’s Press, 1987. [Online]. Retrieved on- December 2016 Available: http://softsprogrammer.blogspot.com/2014/04/lock-folder
G. J. Broadhead, “Style in technical and scientific writing.” In M.G. Moran and D. Joumet, eds. Research in Technical Communication. A Bibliographic Sourcebook, pp. 379-401. Westport. CT: Greenwood Press, 1985.
M. M. Botvinnik, Computers in Chess: Solving Inexact Search Problems. Translated by A. Brown, Berlin: Springer-Verlap, 1984. http://www.cs.wustl.edu/~jain/cis788-97/ftp/ip_security
Smart Handheld Group, Hewlett-Packard Company, Bluetooth Technology Overview[Online]. Retrieved on: October 2016 Available:(http://inpressco.com/wp-content/uploads/2015/02/Paper71397-400.pdf)
Securing Computer Folders using Bluetoothand Rijndael Encryption [Online].Retrieved on - December 2016 Available: (http://inpressco.com/wp-content/uploads/2015/02/Paper71397-400.pdf)
Securing ComputerDeviceUsing Bluetoothtechnology, Retrieved on- December 2016, [Online]. Available: (http://www.ijecs.in/issue/v4-i4/60%20ijecs.pdf)
Wankhade S.B., Damani A.G., Desai S.J., Khanapure A .V., “An Innovative Approach to File Security using Bluetooth”, Mumbai, Maharashtra, IJSET, Vol. 02, Issue No. 5, pp:417-223.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.