CFP last date
20 May 2024
Reseach Article

Enhanced Security Levels of BSPS in WLAN

by Rajesh Duvvuru, Sunil Kr. Singh, P Jagadeeswara Rao, Ankita Sinha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 84 - Number 2
Year of Publication: 2013
Authors: Rajesh Duvvuru, Sunil Kr. Singh, P Jagadeeswara Rao, Ankita Sinha
10.5120/14552-2643

Rajesh Duvvuru, Sunil Kr. Singh, P Jagadeeswara Rao, Ankita Sinha . Enhanced Security Levels of BSPS in WLAN. International Journal of Computer Applications. 84, 2 ( December 2013), 33-39. DOI=10.5120/14552-2643

@article{ 10.5120/14552-2643,
author = { Rajesh Duvvuru, Sunil Kr. Singh, P Jagadeeswara Rao, Ankita Sinha },
title = { Enhanced Security Levels of BSPS in WLAN },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 84 },
number = { 2 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 33-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume84/number2/14552-2643/ },
doi = { 10.5120/14552-2643 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:01:14.919548+05:30
%A Rajesh Duvvuru
%A Sunil Kr. Singh
%A P Jagadeeswara Rao
%A Ankita Sinha
%T Enhanced Security Levels of BSPS in WLAN
%J International Journal of Computer Applications
%@ 0975-8887
%V 84
%N 2
%P 33-39
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Network security is a major confront for the past two decades. Most importantly secure communications in WLAN is still a big challenge. This work majorly concentrated on designing the enhanced security levels for Enhanced Bio-cryptic Security- Aware Packet Scheduling-Algorithm (EBSPS). To enhance exist Bio-cryptic Security- Aware Packet Scheduling-Algorithm (BSPS), it is added with two more security levels by applying the bio-cryption on the facial and hand images. Simulations were performed using the Matlab and NS-2 and later EBSPS compared with the results of present BSPS. To achieve the good Quality-of-Service (QoS) in WLAN, it is replaced with the existing BSPS with novel EBPS. This EBSPS Algorithm besides assuring the finest performance in escalating the security level to the desirable WN by applying Bio-cryptographic methods in each security level. Finally, simulation result proves that proposal is performing superior than existing algorithm in terms of the quality of security.

References
  1. http://www. ieee-globecom. org/2012/private/T10F. pdf
  2. Anastasios N. Bikos, Nicolas Sklavos, "LTE/SAE Security Issues on 4G Wireless Networks," IEEE Security & Privacy, vol. 11, no. 2, pp. 55-62, March-April 2013, doi:10. 1109/MSP. 2012. 136.
  3. Rajesh Duvvuru, Sunil Kumar Singh, G. Narasimha Rao, Ashok Kote4, B. Bala Krishna and M. Vijaya Raju, "Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA," In Proc. Of QSHINE 2013, LNICST 115,Springer, pp. 185–196, January, 2013.
  4. Mohamad El-Abed, et, "Evaluation of biometric systems: a study of users' acceptance and satisfaction," International Journal of Biometrics , Volume 4, Issue 3, pp. 265-290, July 2013.
  5. Xiao Qin, et, "Improving Security of Real-Time Wireless Networks Through Packet Scheduling," IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 9, pp. 3273-3279, September 2008.
  6. Rajesh Duvvuru, P. Jagadeeswara Rao and Sunil Kumar Singh, "Improvizing Security levels in WLAN via Novel BSPS", In Proc. Of IEEE International conference on Emerging Trends in Communication, Control, Signal Processing & Computer Applications 2013(C2SPCA-2013), pp. 71, October 10-11, 2013
  7. S. T. Bhosale and B. S. Sawant, " Security in e-banking via card less biometric atms," International Journal of Advanced Technology & Engineering Research, Volume 2, Issue 4, July 2012
  8. Li Bin and Mehdi Samiei yeganeh, "Comparison for Image Edge Detection Algorithms," IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278 - 0661 Volume 2, Issue 6, pp. 01-04, (July-Aug. 2012),
  9. Sulakshana Bhariya, Guide Jagveer, "A Bio-Cryptography Approach for Improving the Security of Image Encryption and Decryption," International Journal of Technology, Vol. 2: Issue 1, pp. 01-04, 2012.
  10. Bing Wang, ShaoSheng Fan, "An Improved CANNY Edge Detection Algorithm," Second International Workshop on Computer Science and Engineering, 2009,IEEE, iwcse, vol. 1, pp. 497-500, 2009
  11. Samoud Ali and Cherif Adnen, "RSA algorithm implementation for ciphering medical imaging," International Journal of Computer and Electronics Research ,Volume 1, Issue 2, August 2012 .
  12. Christian Rathgeb and Andreas Uhl, "A survey on biometric cryptosystems and cancelable biometrics", Journal on Information Security 2011, Springer, pp. 1-25, 2011.
  13. Kai-Wen Chuang, Chen- Chung Liu, Sheng-Wen Zheng, "A Region-of-Interest Segmentation Algorithm for Palmprint Images," In Proc. of The 29th Workshop on Combinatorial Mathematics and Computation Theory", pp. 96-102, April, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Bio-Cryptography Quality-of-Security Biometrics Security Level Enhanced Bio-cryptic Security- Aware Packet Scheduling-Algorithm Bio-cryptic Security-Aware Packet Scheduling-Algorithm.