Study and Overview of Anti-Trespasser

Authors

  • Jayendra S Jadhav Dept. of Computer Engineering, Lokmanya Tilak College of Engineering, Mumbai, India

Keywords:

Bluetooth, Piconet, Ad-hoc, Trespasser, Mobile

Abstract

In current scenario, security systems remain generic with limited authentication abilities. Existence of such security methods for primary purpose is legitimate. With the growing technology and emergence of malicious people around, it may be possible to break barriers. Safety of one’s precious data is primary concern. This project proposes a security mechanism to enhance the level of security for every individual. The application tries to leverage individual’s presence to be a key to access virtual area. The system requires mobile device with Bluetooth functionality, which is coupled with principle device that you need to secure. The Project aims to tightly couple security mechanism with the operating system allowing it to take final steps to maintain privacy of data.

 

References

Esteban Alcorn, Bluetooth Architecture Overview”, Microsoft Windows Embedded Compact 7, Published: March 2011, https://www.ieee.org/documents/ieeecitationref.pdf

S.K. Kenue and J.F. Greenleaf, “Limited angle multifrequency diffiaction tomography,” IEEE Trans. Sonics Ultrason., vol. SU-29, no. 6, pp. 213-2 17, July 1982. www.techterms.com/definition/manet

C. Brusaw, C. Aired, and W. Oliu, Handbook of Technical Writing, 3rd ed. New York: St. Martin’s Press, 1987. [Online]. Retrieved on- December 2016 Available: http://softsprogrammer.blogspot.com/2014/04/lock-folder

G. J. Broadhead, “Style in technical and scientific writing.” In M.G. Moran and D. Joumet, eds. Research in Technical Communication. A Bibliographic Sourcebook, pp. 379-401. Westport. CT: Greenwood Press, 1985.

M. M. Botvinnik, Computers in Chess: Solving Inexact Search Problems. Translated by A. Brown, Berlin: Springer-Verlap, 1984. http://www.cs.wustl.edu/~jain/cis788-97/ftp/ip_security

Smart Handheld Group, Hewlett-Packard Company, Bluetooth Technology Overview[Online]. Retrieved on: October 2016 Available:(http://inpressco.com/wp-content/uploads/2015/02/Paper71397-400.pdf)

Securing Computer Folders using Bluetoothand Rijndael Encryption [Online].Retrieved on - December 2016 Available: (http://inpressco.com/wp-content/uploads/2015/02/Paper71397-400.pdf)

Securing ComputerDeviceUsing Bluetoothtechnology, Retrieved on- December 2016, [Online]. Available: (http://www.ijecs.in/issue/v4-i4/60%20ijecs.pdf)

Wankhade S.B., Damani A.G., Desai S.J., Khanapure A .V., “An Innovative Approach to File Security using Bluetooth”, Mumbai, Maharashtra, IJSET, Vol. 02, Issue No. 5, pp:417-223.

Downloads

Published

2017-08-30

How to Cite

[1]
J. S. Jadhav, “Study and Overview of Anti-Trespasser”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 5, no. 4, pp. 60–62, Aug. 2017.

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.