Implementation of Security Protocol for Wireless Computer in Virtual Laboratory
Main Article Content
Abstract
Implementing security model for wireless computer network we require effective Wireless intranet setup; many models are in working to funct ion. This thing is focused at developing a security model to secure a Wireless Computer network of any institution. The model will develop to secure a Wireless Computer class - room through an authentication server by supplying authentication constraint at registration process, which is used at login for comparison then it will store. Fingerprint is used to make sure that a user is who claims to be. Time duration for access is allotted fo r a user, after which primary constraint will supplied for re - authentica tion. While a user is still logged - on, some security questions will pose intermittently to avoid counterfeiting. The methodology used for this research will be Structured System Analysis and Design (SSAD). For coding the program Java Programming Language w ill use and MySQL as a database. The final result of the system will secure model that guarantees secure access. This is different from the security of other wireless virtual class - room which uses only users name, pin or registration number.
Article Details
How to Cite
, H. N. W. (ME I. yr), A. B. D. (Asso.Prof), D. A. D. G. (HOD). (2013). Implementation of Security Protocol for Wireless Computer in Virtual Laboratory. International Journal on Recent and Innovation Trends in Computing and Communication, 1(12), 852–857. https://doi.org/10.17762/ijritcc.v1i12.2878
Section
Articles