CFP last date
20 December 2024
Reseach Article

Enhanced Merged Security Levels of BSPS in WLAN

by Avala Ramesh, S. Pallam Setty
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 88 - Number 7
Year of Publication: 2014
Authors: Avala Ramesh, S. Pallam Setty
10.5120/15365-3862

Avala Ramesh, S. Pallam Setty . Enhanced Merged Security Levels of BSPS in WLAN. International Journal of Computer Applications. 88, 7 ( February 2014), 26-34. DOI=10.5120/15365-3862

@article{ 10.5120/15365-3862,
author = { Avala Ramesh, S. Pallam Setty },
title = { Enhanced Merged Security Levels of BSPS in WLAN },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 88 },
number = { 7 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 26-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume88/number7/15365-3862/ },
doi = { 10.5120/15365-3862 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:07:01.112543+05:30
%A Avala Ramesh
%A S. Pallam Setty
%T Enhanced Merged Security Levels of BSPS in WLAN
%J International Journal of Computer Applications
%@ 0975-8887
%V 88
%N 7
%P 26-34
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security and quality of service are two major problems in wireless communications. This work concentrated on improving the security levels for Enhanced Bio-cryptic Security- Aware Packet Scheduling-Algorithm (EBSPS) and also the fast communication between Wireless Node (WN) and Advanced Radius authentication server (ARAS). This paper introduces a novel Enhanced Merged Bio-cryptic Security- Aware Packet Scheduling-Algorithm (EMBSPS). Simulations were conducted using the Matlab and EMBSPS is compared with the results of present EBSPS and BSPS. To accomplish better Quality-of-Service (QoS) in WLAN, it is substituted with the existing EBSPS with novel EMBSPS. This EMBSPS Algorithm assures the finest concert in improving the security levels and speeds up the authentication process. Lastly, simulation result proves that proposed model is performing finer than the present algorithm in terms of the quality of service.

References
  1. http://www. ieee-globecom. org/2012/private/T10F. pdf
  2. Anastasios N. Bikos, Nicolas Sklavos, "LTE/SAE Security Issues on 4G Wireless Networks," IEEE Security & Privacy, vol. 11, no. 2, pp. 55-62, March-April 2013, doi:10. 1109/MSP. 2012. 136.
  3. Rajesh Duvvuru, Sunil Kumar Singh, G. Narasimha Rao, Ashok Kote, B. Bala Krishna and M. Vijaya Raju, "Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA," In Proc. Of QSHINE 2013, LNICST 115,Springer, pp. 185–196, January, 2013.
  4. Mohamad El-Abed, et, "Evaluation of biometric systems: a study of users' acceptance and satisfaction," International Journal of Biometrics , Volume 4, Issue 3, pp. 265-290, July 2013.
  5. Xiao Qin, et, "Improving Security of Real-Time Wireless Networks Through Packet Scheduling," IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 9, pp. 3273-3279, September 2008.
  6. Rajesh Duvvuru, P. Jagadeeswara Rao and Sunil Kumar Singh, "Improvizing Security levels in WLAN via Novel BSPS", In Proc. Of IEEE International conference on Emerging Trends in Communication, Control, Signal Processing & Computer Applications 2013(C2SPCA-2013), pp. 71, October 10-11, 2013.
  7. Rajesh Duvvuru, P. Jagadeeswara Rao, Sunil Kumar Singh and Ankita Sinha, "Enhanced Security levels of BSPS in WLAN", Published In the International Journal of Computer Applications, Volume 84 - Number 2, pp. 33-39, December 2013
  8. S. T. Bhosale and B. S. Sawant, " Security in e-banking via card less biometric atms," International Journal of Advanced Technology & Engineering Research, Volume 2, Issue 4, July 2012
  9. Li Bin and Mehdi Samiei yeganeh, "Comparison for Image Edge Detection Algorithms," IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278 - 0661 Volume 2, Issue 6, pp. 01-04, July-Aug. 2012.
  10. Sulakshana Bhariya, Guide Jagveer, "A Bio-Cryptography Approach for Improving the Security of Image Encryption and Decryption," International Journal of Technology, Vol. 2: Issue 1, pp. 01-04, 2012.
  11. Bing Wang, ShaoSheng Fan, "An Improved CANNY Edge Detection Algorithm," Second International Workshop on Computer Science and Engineering, 2009,IEEE, iwcse, vol. 1, pp. 497-500, 2009
  12. Samoud Ali and Cherif Adnen, "RSA algorithm implementation for ciphering medical imaging," International Journal of Computer and Electronics Research ,Volume 1, Issue 2, August 2012 .
  13. Sankaran, M. Vatsa, and R. Singh, Hierarchical Fusion for Matching Simultaneous Latent Fingerprint, In Proceedings of International Conference on Biometrics: Theory, Applications and Systems, 2012.
  14. Ajay Kumar and Arun Passi, "Comparison and combination of iris matchers for reliable personal authentication," Pattern Recognition, vol. 43, no. 3, pp. 1016-1026, Mar. 2010
  15. Ajay Kumar, Sumit Shekhar, "Personal Identification using Rank-level Fusion," IEEE Trans. Systems, Man, and Cybernetics: Part C, pp. 743-752, vol. 41, no. 5, Sep. 2011
  16. Vidit Jain and Amitabha Mukherjee, "The Indian Face Database",2002,(http://vis-www. cs. umass. . edu/$sim$vidit/{I}ndian{F}ace{D}atabase).
  17. Kai-Wen Chuang, Chen- Chung Liu, Sheng-Wen Zheng, "A Region-of-Interest Segmentation Algorithm for Palmprint Images," In Proc. of The 29th Workshop on Combinatorial Mathematics and Computation Theory", pp. 96-102, April, 2012.
  18. Christian Rathgeb and Andreas Uhl, "A survey on biometric cryptosystems and cancelable biometrics", Journal on Information Security 2011, Springer, pp. 1-25, 2011.
  19. Zhongjian Zhao and Xiaoqiang Zhang. "ECC-Based Image Encryption Using Code Computing. . " Proceedings of the 2012 International Conference on Communication, Electronics and Automation Engineering Advances in Intelligent Systems and Computing, Volume 181, Springer, pp 859-865, 2013
  20. Yaobin Mao and Guanrong Chen. "Chaos-Based Image Encryption. " Applications in Pattern Recognition, Computer Vision, Neuralcomputing, and Robotics, Springer, pp 231-265, 2005.
  21. Avala Ramesh and S. Pallem Setty, "Analysis on Biometric Encryption using RSA algorithm," Published In the IJMER, Volume 2, Issue 11(2), pp. 302-307, October 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Bio-Cryptography Quality-of-Security Biometrics Security Level Enhanced Merged Bio-cryptic Security- Aware Packet Scheduling-Algorithm Bio-cryptic Security-Aware Packet Scheduling-Algorithm