Implementation of Security Protocol for Wireless Computer in Virtual Laboratory

Main Article Content

H. N. Watane (ME IInd yr), A. B. Deshmukh (Asso.Prof), Dr. A. D. Gawande (HOD)

Abstract

Implementing security model for wireless computer network we require effective Wireless intranet setup; many models are in working to funct ion. This thing is focused at developing a security model to secure a Wireless Computer network of any institution. The model will develop to secure a Wireless Computer class - room through an authentication server by supplying authentication constraint at registration process, which is used at login for comparison then it will store. Fingerprint is used to make sure that a user is who claims to be. Time duration for access is allotted fo r a user, after which primary constraint will supplied for re - authentica tion. While a user is still logged - on, some security questions will pose intermittently to avoid counterfeiting. The methodology used for this research will be Structured System Analysis and Design (SSAD). For coding the program Java Programming Language w ill use and MySQL as a database. The final result of the system will secure model that guarantees secure access. This is different from the security of other wireless virtual class - room which uses only users name, pin or registration number.

Article Details

How to Cite
, H. N. W. (ME I. yr), A. B. D. (Asso.Prof), D. A. D. G. (HOD). (2013). Implementation of Security Protocol for Wireless Computer in Virtual Laboratory. International Journal on Recent and Innovation Trends in Computing and Communication, 1(12), 852–857. https://doi.org/10.17762/ijritcc.v1i12.2878
Section
Articles