CFP last date
20 January 2025
Reseach Article

Identification of Merged Bio-cryptic Patterns using Bio-Pattern Recognition Algorithm in Security Levels of Wireless Local Area Network

by Ajay Babu Moparthi, Sudhakar Godi, Rajasekhara Rao Kurra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 14
Year of Publication: 2015
Authors: Ajay Babu Moparthi, Sudhakar Godi, Rajasekhara Rao Kurra
10.5120/ijca2015906290

Ajay Babu Moparthi, Sudhakar Godi, Rajasekhara Rao Kurra . Identification of Merged Bio-cryptic Patterns using Bio-Pattern Recognition Algorithm in Security Levels of Wireless Local Area Network. International Journal of Computer Applications. 126, 14 ( September 2015), 15-19. DOI=10.5120/ijca2015906290

@article{ 10.5120/ijca2015906290,
author = { Ajay Babu Moparthi, Sudhakar Godi, Rajasekhara Rao Kurra },
title = { Identification of Merged Bio-cryptic Patterns using Bio-Pattern Recognition Algorithm in Security Levels of Wireless Local Area Network },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 14 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number14/22620-2015906290/ },
doi = { 10.5120/ijca2015906290 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:17:27.792797+05:30
%A Ajay Babu Moparthi
%A Sudhakar Godi
%A Rajasekhara Rao Kurra
%T Identification of Merged Bio-cryptic Patterns using Bio-Pattern Recognition Algorithm in Security Levels of Wireless Local Area Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 14
%P 15-19
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication module plays a vital role in securing wired or wireless network from intrusion attacks. Especially Wireless Networks (WN) are more prone to the security threats. This paper discusses in strengthening the authentication process of Wireless Local Area Network (WLAN) by recognition of various levels of Wireless Authentication Packets (WAP). The WAP comprises of diverse combinations of Bio-cryptic merged patterns like thumb-print, Iris, Palm-print and face. WAP is used in accordance with the security level. In general, the biometric pattern matching algorithm is used to match the patterns individually. But in WLAN, the Advanced Radius Authentication Server (ARAS) comprises of Merged Bio-cryptic pattern matching and identification is a challenging task for the practitioners and investigators. To resolve the above issue, this work proposes a novel Bio-Pattern Recognition (BPR) Algorithm for the effective recognition of the Bio-cryptic patterns. The proposed algorithm was compared with the existing each individual recognition algorithm. Where reliability, recognition time, True Positive Identification Rate (TPIR) and  False Negative Identfication Rate (FNIR) were considered as major parameters. Finally the experimental results show the overall performance of the proposed BPR algorithm is better in patter recognition with respect to the recognition time.

References
  1. Akyildiz, Ian F., and Xudong Wang. "A survey on wireless mesh networks." Communications Magazine, IEEE 43.9 (2005): S23-S30.
  2. Rappaport, Theodore S. Wireless communications: principles and practice. Vol. 2. New Jersey: prentice hall PTR, 1996.
  3. Youssef, Moustafa A., Ashok Agrawala, and A. Udaya Shankar. "WLAN location determination via clustering and probability distributions." Pervasive Computing and Communications, 2003.(PerCom 2003). Proceedings of the First IEEE International Conference on. IEEE, 2003.
  4. Yao, Yu-Dong, et al. "Method/apparatus for an accelerated response to resource allocation requests in a CDMA push-to-talk system using a CDMA interconnect subsystem to route calls." U.S. Patent No. 5,983,099. 9 Nov. 1999.
  5. Andrews, Jeffrey G., Arunabha Ghosh, and Rias Muhamed. Fundamentals of WiMAX: understanding broadband wireless networking. Pearson Education, 2007.
  6. Sevtsuk, Andres, et al. "Mapping the MIT campus in real time using WiFi." Handbook of Research on Urban Informatics: The Practice and Promise of the Real-Time City (2009).
  7. Ramesh, Avala, and S. Pallam Setty. "Enhanced Merged Security Levels of BSPS in WLAN." International Journal of Computer Applications 88.7 (2014): 26-34.
  8. Ramesh, Avala Ramesh and S. Pallam Setty. "Enhanced Authentication Mechanism in WLAN via MMBSPS", In IJMER, Vol-3, 4(7) , April 2014.
  9. Duvvuru, Rajesh, P. Jagadeeswara Rao, and Sunil Kumar Singh. "Improvizing Security levels in WLAN via Novel BSPS." Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 International Conference on. IEEE, 2013.
  10. Wright, John, et al. "Robust face recognition via sparse representation." Pattern Analysis and Machine Intelligence, IEEE Transactions on 31.2 (2009): 210-227.
  11. Jea, Tsai-Yang, and Venu Govindaraju. "A minutia-based partial fingerprint recognition system." Pattern Recognition 38.10 (2005): 1672-1684.
  12. Zhang, Dapeng, and Wei Shu. "Two novel characteristics in palmprint verification: datum point invariance and line feature matching." Pattern Recognition 32.4 (1999): 691-702.
  13. Pillai, Jaishanker K., et al. "Secure and robust iris recognition using random projections and sparse representations." Pattern Analysis and Machine Intelligence, IEEE Transactions on 33.9 (2011): 1877-1893.
  14. Duvvuru, Rajesh, et al. "Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA." Quality, Reliability, Security and Robustness in Heterogeneous Networks. Springer Berlin Heidelberg, 2013. 185-196.
  15. Duvvuru, Rajesh, P. Jagadeeswara Rao, Sunil Kumar Singh, and Ankita Sinha. "Enhanced Security levels of BSPS in WLAN." International Journal of Computer Applications 84, no. 2 (2013): 33-39.
  16. Kumar, Sanjay. "Enhancing the Security Levels in WLAN via Novel IBSPS." Advanced Computing, Networking and Informatics-Volume 2. Springer International Publishing, 2014. 351-359.
  17. Ramesh, Avala, and S. Pallam Setty. "A Comparative Study on Security Levels in WLAN." International Journal of Computer Applications 93.8 (2014): 11-17.
  18. Godi, Sudhakar. "Improved Security Levels of Wireless LAN through DBSPS." International Journal of Computer Applications 106, no. 14 (2014).
  19. Geddada, Uma Devi, and Kaligithi Rajesh Kumar. "MMBWPS FOR STRENGTHENING AUTHENTICATION PROCESS IN WIRELESS LOCAL AREA NETWORKS." Published in International Jounral of Computer applications and Engineering,, vol-8, 1(1), 174-184.
  20. Ajay Kumar, "Incorporating Cohort Information for Reliable Palmprint Authentication," Proc. ICVGIP, Bhubneshwar, India, pp. 583-590, Dec. 2008
  21. Ajay Kumar, Sumit Shekhar, "Personal Identification using Rank-level Fusion,"  IEEE Trans.  Systems, Man, and Cybernetics: Part C, pp. 743-752, vol. 41, no. 5, Sep. 2011.
  22. D. Yadav, N. Kohli, R. Singh, and M. Vatsa, Revisiting Iris Recognition with Color CosmeticContact Lenses, 6th IAPR International Conference on Biometrics, June, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Bio-Cryptography Bio-pattern recognition algorithm Quality-of-Security ASPS SPSS Biometrics Security Level Enhanced Merged Bio-cryptic Security- Aware Packet Scheduling-Algorithm Bio-cryptic Security-Aware Packet Scheduling-Algorithm BSPS EBSPS MMBSPS BPR Algorithm.