We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Improved Security Levels of Wireless LAN through DBSPS

by R.s.k.s.ganesh, Sudhakar Godi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 106 - Number 14
Year of Publication: 2014
Authors: R.s.k.s.ganesh, Sudhakar Godi
10.5120/18589-9900

R.s.k.s.ganesh, Sudhakar Godi . Improved Security Levels of Wireless LAN through DBSPS. International Journal of Computer Applications. 106, 14 ( November 2014), 22-27. DOI=10.5120/18589-9900

@article{ 10.5120/18589-9900,
author = { R.s.k.s.ganesh, Sudhakar Godi },
title = { Improved Security Levels of Wireless LAN through DBSPS },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 106 },
number = { 14 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 22-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume106/number14/18589-9900/ },
doi = { 10.5120/18589-9900 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:39:24.001118+05:30
%A R.s.k.s.ganesh
%A Sudhakar Godi
%T Improved Security Levels of Wireless LAN through DBSPS
%J International Journal of Computer Applications
%@ 0975-8887
%V 106
%N 14
%P 22-27
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Networks plays a vital role in the field of Information and Communication Technology (ICT). Security to the Wireless networks is a major challenge to the researchers and practitioners. Especially Wireless Local Area Networks are more prone to security threats. This work introduces a novel technique Double Bio-cryptic Security-aware Packet Scheduling (DBSPS) which strengthens security aspects in WLAN's. To strengthen the WLAN security, this work improved the security levels security through double Biometric image encryption. Simulations were performed on Thumb print, Iris, Palm print and Facial databases by using the Matlab and later DBSPS results were compared with the of present Enhanced Bio-Cryptic Security-aware Packet Scheduling (EBSPS) and Bio-Cryptic Security-aware Packet Scheduling (BSPS) algorithms. In order to achieve high Quality-of-Security (QoS) in WLAN, the EBSPS is replaced with the new DBSPS. This DBSPS Algorithm assures the finest performance in increasing the security level to the desirable Wireless Node (WN) applies Double Bio-cryptographic methods in every security level. Finally, simulation outcome proved that proposal mechanism DBSPS is performing well than existing techniques in terms of the security.

References
  1. Welch, Donald J. , and Scott Lathrop. "A survey of 802. 11 a wireless security threats and security mechanisms. " United States Military Academy West Point (2003).
  2. http://www. sophos. com/en-us/medialibrary/PDFs/other/sophos-security-threat-report-2014. pdf
  3. Xi, Kai, and Jiankun Hu. "Bio-cryptography. " Handbook of Information and Communication Security. Springer Berlin Heidelberg, 2010. 129-157.
  4. Plateaux, Aude, et al. "One-Time Biometrics for Online Banking and Electronic Payment Authentication. " Availability, Reliability, and Security in Information Systems. Springer International Publishing, 2014. 179-193.
  5. https://eaadhaar. uidai. gov. in/ (Accessed on 06/05/2014)
  6. Ramesh, Avala, and S. Pallam Setty. "Analysis on biometric encryption using RSA algorithm. " International Journal Multidisciplinary Educational and Research 1. 3 (2013): 302-307.
  7. Bhariya, Sulakshana. "Guide Jagveer,"A Bio-Cryptography Approach for Improving the Security of Image Encryption and Decryption,". " International Journal of Technology 2. 1 (2012): 01-04.
  8. Duvvuru, Rajesh, et al. "Performance Analysis of Multi-class Steganographic Methods Based on Multi-Level Re-stegnography. " ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol II. Springer International Publishing, 2014.
  9. Xiao Qin, et, "Improving Security of Real-Time Wireless Networks Through Packet Scheduling," IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 9, pp. 3273-3279, September 2008.
  10. Rajesh Duvvuru, Sunil Kumar Singh, G. Narasimha Rao, Ashok Kote4, B. Bala Krishna and M. Vijaya Raju, "Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA," In Proc. Of QSHINE 2013, LNICST 115,Springer, pp. 185–196, January, 2013.
  11. Rajesh Duvvuru, P. Jagadeeswara Rao and Sunil Kumar Singh, "Improvizing Security levels in WLAN via Novel BSPS", In Proc. Of IEEE International conference on Emerging Trends in Communication, Control, Signal Processing & Computer Applications 2013(C2SPCA-2013), pp. 71, October 10-11, 2013
  12. Duvvuru, Rajesh, et al. "Enhanced Security levels of BSPS in WLAN. " International Journal of Computer Applications 84. 2 (2013): 33-39.
  13. Ramesh, Avala, and S. Pallam Setty. "Enhanced Merged Security Levels of BSPS in WLAN. " International Journal of Computer Applications 88. 7 (2014): 26-34.
  14. Ramesh, Avala Ramesh and S. Pallam Setty. "Enhanced Authntication Mechanism in WLAN via MMBSPS", In Proc. of IEEE's International Conferences For Convergence Of Technology, Pune,India, pp, April, 2014.
  15. Kumar, Sanjay. "Enhancing the Security Levels in WLAN via Novel IBSPS. " Advanced Computing, Networking and Informatics-Volume 2. Springer International Publishing, 2014. 351-359.
  16. Ramesh, Avala, and S. Pallam Setty. "A Comparative Study on Security Levels in WLAN. " International Journal of Computer Applications 93 (2014).
  17. Ajay Kumar, "Incorporating Cohort Information for Reliable Palmprint Authentication," Proc. ICVGIP, Bhubneshwar, India, pp. 583-590, Dec. 2008
  18. Ajay Kumar, Sumit Shekhar, "Personal Identification using Rank-level Fusion," IEEE Trans. Systems, Man, and Cybernetics: Part C, pp. 743-752, vol. 41, no. 5, Sep. 2011.
  19. D. Yadav, N. Kohli, R. Singh, and M. Vatsa, Revisiting Iris Recognition with Color CosmeticContact Lenses, 6th IAPR International Conference on Biometrics, June, 2013.
  20. A. Sankaran, M. Vatsa, and R. Singh, Hierarchical Fusion for Matching Simultaneous Latent Fingerprint, In Proceedings of International Conference on Biometrics: Theory, Applications and Systems, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Bio-Cryptography Quality-of-Security Biometrics Security Level Double Bio-cryptic Security- Aware Packet Scheduling-Algorithm Enhanced Bio-cryptic Security- Aware Packet Scheduling-Algorithm Bio-cryptic Security-Aware Packet Scheduling-Algorithm BSPS ASPS DBSPS EBSPS.