CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Chaos based Improved Double Bio-cryptic Authentication Process to Access WLAN

by Perabathula Naganjaneya Prasad, Kodeti Haritha Rani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 128 - Number 14
Year of Publication: 2015
Authors: Perabathula Naganjaneya Prasad, Kodeti Haritha Rani
10.5120/ijca2015906735

Perabathula Naganjaneya Prasad, Kodeti Haritha Rani . Chaos based Improved Double Bio-cryptic Authentication Process to Access WLAN. International Journal of Computer Applications. 128, 14 ( October 2015), 15-20. DOI=10.5120/ijca2015906735

@article{ 10.5120/ijca2015906735,
author = { Perabathula Naganjaneya Prasad, Kodeti Haritha Rani },
title = { Chaos based Improved Double Bio-cryptic Authentication Process to Access WLAN },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 128 },
number = { 14 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 15-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume128/number14/22941-2015906735/ },
doi = { 10.5120/ijca2015906735 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:22:10.120402+05:30
%A Perabathula Naganjaneya Prasad
%A Kodeti Haritha Rani
%T Chaos based Improved Double Bio-cryptic Authentication Process to Access WLAN
%J International Journal of Computer Applications
%@ 0975-8887
%V 128
%N 14
%P 15-20
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The usage and applicability of Information and Communication Technology (ICT) is increased from the past three decades. Monitoring quality-of-Service (QoS) pertaining to networks is a major challenge for the researchers and academicians. Bandwidth, Latency, Jitter, Loss of data and security are some of the important parameters related to the network QoS. Especially security plays an important role regarding data confidentiality in wired or wireless networks is concerned. Particularly, there is a need to strengthen the authentication process in Wireless Local Area Network (WLAN). This paper introduces a novel Double Chaotic Bio-cryptic Security aware Packet Scheduling (DCBSPS) algorithm to improve WLAN’s authentication mechanism. DCBSPS algorithm comprises different security levels in association with chaos based cryptic biometrics like face, fingerprint, Iris, and thumb print. In addition, DCBSPS algorithms take the advantages of Chaotic Bio-cryptic Security aware Packet Scheduling (CBSPS) and Chaotic Multilevel Remote Sensing Data encryption (CMRSDE) algorithms to improve the Quality-of-Authentication in WLAN. The experimental results of DCBSPS were compared with the chaotic and non-chaotic, based procedures like CBSPS and Multi-merged Bio-cryptic Security aware Packet-scheduling (MMBSPS). The obtained results exhibits, DCBSPS algorithm performs better than the rest in terms of reliability, security level, guarantee ratio and Overall Performance.

References
  1. http://www.ti.com/ww/en/internet_of_things/iot-applications.html (Accessed on 06/06/2015)
  2. Hiltunen, Kimmo. "WLAN attacks and risks." White Paper, Ericson (2008).
  3. https://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2015_ASR.pdf (Accessed on 08/07/2015)
  4. Xi, Kai, and Jiankun Hu. "Bio-cryptography." In Handbook of Information and Communication Security, pp. 129-157. Springer Berlin Heidelberg, 2010.
  5. Xiao Qin, et, “Improving Security of Real-Time Wireless Networks Through Packet Scheduling,” IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 9, pp.3273-3279, September 2008.
  6. Rajesh Duvvuru, Sunil Kumar Singh, G. Narasimha Rao, Ashok Kote, B.Bala Krishna and M. Vijaya Raju, “Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA,” In Proc. Of QSHINE 2013, LNICST 115,Springer, pp. 185–196, January, 2013.
  7. Duvvuru, Rajesh, P. Jagadeeswara Rao, and Sunil Kumar Singh. "Improvizing Security levels in WLAN via Novel BSPS." Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 International Conference on. IEEE, 2013.
  8. Duvvuru, Rajesh, et al. "Enhanced Security levels of BSPS in WLAN." International Journal of Computer Applications 84.2 (2013): 33-39.
  9. Ramesh, Avala, and S. Pallam Setty. "Enhanced Merged Security Levels of BSPS in WLAN." International Journal of Computer Applications 88.7 (2014): 26-34.
  10. Ramesh, Avala Ramesh and S. Pallam Setty. "Enhanced Authntication Mechanism in WLAN via MMBSPS", In IJMER, Special edition , April 2014.
  11. Kumar, Sanjay. "Enhancing the Security Levels in WLAN via Novel IBSPS." Advanced Computing, Networking and Informatics-Volume 2. Springer International Publishing, 2014. 351-359.
  12. Godi, Sudhakar. "Improved Security Levels of Wireless LAN through DBSPS." International Journal of Computer Applications 106.14 (2014).
  13. Geddada, Uma Devi, and Kaligithi Rajesh Kumar. "MMBWPS FOR STRENGTHENING AUTHENTICATION PROCESS IN WIRELESS LOCAL AREA NETWORKS." International Journal of Computer Engineering and Applications, Volume VIII, Issue I, Part I, 174-184, October 14.
  14. Sanjay Kumar and D K Shaw. " Chaos based Encryption Mechanism for Wireless Local Area Network Authentication." International Journal of Applied Engineering Research 10.15 (2015): 35145-35152.
  15. Duvvuru, Rajesh, P. Jagadeeswara Rao, and Gudikandhula Narasimha Rao. "Multi-Level Chaos Based Encryption Mechanism to Enhance Security of High Security Zone Areas on Google Map Satellite Images of India." International Journal of Applied Engineering Research 10.3 (2015): 8059-8072.
  16. Wei-bin, Chen, and Zhang Xin. "Image encryption algorithm based on Henon chaotic system." In Image Analysis and Signal Processing, 2009. IASP 2009. International Conference on, pp. 94-97. IEEE, 2009.
  17. Wu, Yue, Gelan Yang, Huixia Jin, and Joseph P. Noonan. "Image encryption using the two-dimensional logistic chaotic map." Journal of Electronic Imaging21, no. 1 (2012): 013014-1.
  18. Ajay Kumar, "Incorporating Cohort Information for Reliable Palmprint Authentication," Proc. ICVGIP, Bhubneshwar, India, pp. 583-590, Dec. 2008
  19. Ajay Kumar, Sumit Shekhar, "Personal Identification using Rank-level Fusion,"  IEEE Trans.  Systems, Man, and Cybernetics: Part C, pp. 743-752, vol. 41, no. 5, Sep. 2011.
  20. D. Yadav, N. Kohli, R. Singh, and M. Vatsa, Revisiting Iris Recognition with Color CosmeticContact Lenses, 6th IAPR International Conference on Biometrics, June, 2013.
  21. A. Sankaran, M. Vatsa, and R. Singh, Hierarchical Fusion for Matching Simultaneous Latent Fingerprint, In Proceedings of International Conference on Biometrics: Theory, Applications and Systems, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Double Chaotic Bio-cryptic Security aware Packet Scheduling CBSPS DCBSPS Chaotic Chaos Logistic map Henon map and encryption.