Remote System Controller: An Implementation of a Secure Channel
نویسنده
چکیده
Now, a day’s Security over a Network is a must. Everyone wants to share files with others like Facebook, Pinterest. But are they aware whether the network on which they are Sharing files is Secure? So to help these kind of People who are not aware of what’s going on in Background there is a Kerberos cum Remote System Controller (RSC) System. Kerberos as a name looks like a Network Protocol, just for authentication purpose. This system allows a person to send, transfer, share any file or document over a particular Network in a Secured way. So that no one reveal the type of transaction going on between the two parties. The proposed System works on the Client Server architecture model, which says the Client will have to prove its Identity to the server before accessing anything. The objective of this System cum Controller was just to make users aware of what’s happening on back-end of which they are Un-aware of. The Controller is a “window based application” to be implemented by a client or the Sender. The use of mediator is mainly just to reduce the Resources Utilization Power. The System will work based on Secured client’s password, Internet Protocol address and name of the service to be used. The Concept will rotate whole about Key Distribution Centre who will use DES i.e. Data Encryption Standard Algorithm for Transmission. RSC is using LSB i.e. Least Significant Bit Algorithm for Cryptography and Steganography. So, any client can send and receive files which can be Audio, Text and Video along with Data file containing Hidden text messages. All the Functionality is under a Single Page Cum Software, so that clients have the choice what Receiver and Sender wants to do. Key Terms: Window based Application; GUI; Kerberos protocol; Java; Cryptography and Steganography
منابع مشابه
Delay-dependent stability for transparent bilateral teleoperation system: an LMI approach
There are two significant goals in teleoperation systems: Stability and performance. This paper introduces an LMI-based robust control method for bilateral transparent teleoperation systems in presence of model mismatch. The uncertainties in time delay in communication channel, task environment and model parameters of master-slave systems is called model mismatch. The time delay in communicatio...
متن کاملAnti-Synchronization of Complex Chaotic T-System Via Optimal Adaptive Sliding-Mode and Its Application In Secure Communication
In this paper, an optimal adaptive sliding mode controller is proposed for anti-synchronization of two identical hyperchaotic systems. We use hyperchaotic complex T-system for master and slave systems with unknown parameters in the slave system. To construct the optimal adaptive sliding mode controller, first a simple sliding surface is designed. Then, the optimal adaptive sliding mode controll...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملLabVIEW implementation of an enhanced nonlinear PID controller based on harmony search for one-stage servomechanism system
This paper presents a practical implementation for a new formula of nonlinear PID (NPID) control. The purpose of the controller is to accurately trace a preselected position reference of one stage servomechanism system. The possibility of developing a transfer function model for experimental setup is elusive because of the lack of system data. So, the identified model has been developed via gat...
متن کاملAn efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013