CFP last date
20 May 2024
Reseach Article

A Comparative Study on Security Levels in WLAN

by Avala Ramesh, S. Pallam Setty
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 8
Year of Publication: 2014
Authors: Avala Ramesh, S. Pallam Setty
10.5120/16234-5755

Avala Ramesh, S. Pallam Setty . A Comparative Study on Security Levels in WLAN. International Journal of Computer Applications. 93, 8 ( May 2014), 11-17. DOI=10.5120/16234-5755

@article{ 10.5120/16234-5755,
author = { Avala Ramesh, S. Pallam Setty },
title = { A Comparative Study on Security Levels in WLAN },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 8 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 11-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number8/16234-5755/ },
doi = { 10.5120/16234-5755 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:15:15.938558+05:30
%A Avala Ramesh
%A S. Pallam Setty
%T A Comparative Study on Security Levels in WLAN
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 8
%P 11-17
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security of wireless network is vital research area for the researchers and scientists. This work demonstrates a deep study of security levels in Wireless Local Area Networks (WLAN). This study includes different security schemes of WLAN like Security Aware Packet Scheduling Algorithm (SPSS), Automated Security-Aware Packet Scheduling (ASPS), Bio-cryptic Security-Aware Packet Scheduling (BSPS), Enhanced Bio-cryptic Security-Aware Packet Scheduling (EBSPS), Enhanced Merged Bio-cryptic Security-Aware Packet Scheduling (EMBSPS) and Multi Merged Bio-cryptic Security-Aware Packet Scheduling (MMBSPS). To analyze the performance of the each algorithm some simulations were conducted by considering different parameters like Security Level (SL), size of Wireless Data Packet (WDP), Speedy Authentication (SA) and Load- on-network Switch (LOS). The simulations were performed using Matlab and Network Simulator-2. Finally our experiment result concludes that, each algorithm has got its own advantages and limitations.

References
  1. Cheddad, Abbas, Joan Condell, Kevin Curran, and Paul Mc Kevitt. "Digital image steganography: Survey and analysis of current methods. " Signal Processing 90, no. 3 (2010): 727-752.
  2. Rivest, Ronald L. , Adi Shamir, and Len Adleman. "A method for obtaining digital signatures and public-key cryptosystems. " Communications of the ACM 21. 2 (1978): 120-126.
  3. William, Stallings, and William Stallings. Cryptography and Network Security, 4/E. Pearson Education India, 2006.
  4. Hardt, Dick C. "Distributed hierarchical identity management system authentication mechanisms. " U. S. Patent No. 7,454,623. 18 Nov. 2008.
  5. Wu, Bing, et al. "A survey of attacks and countermeasures in mobile ad hoc networks. " Wireless Network Security. Springer US, 2007. 103-135.
  6. Krawczyk, Hugo, Ran Canetti, and Mihir Bellare. "HMAC: Keyed-hashing for message authentication. " (1997).
  7. Hu, Yih-Chun, Adrian Perrig, and David B. Johnson. "Packet leashes: a defense against wormhole attacks in wireless networks. " INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. Vol. 3. IEEE, 2003.
  8. Bellardo, John, and Stefan Savage. "802. 11 denial-of-service attacks: Real vulnerabilities and practical solutions. " Proceedings of the USENIX Security Symposium. 2003.
  9. Avala Ramesh and S. Pallam Setty. "Enhanced Merged Security Levels of BSPS in WLAN. " International Journal of Computer Applications 88 (2014).
  10. Avala Ramesh and S. Pallam Setty. "Enhanced Authntication Mechanism in WLAN via MMBSPS", In Proc. of IEEE's International Conferences For Convergence Of Technology, Pune,India, pp. , April, 2014.
  11. Rajesh Duvvuru, P. Jagadeeswara Rao and Sunil Kumar Singh, "Improvizing Security levels in WLAN via Novel BSPS", In Proc. Of IEEE International conference on Emerging Trends in Communication, Control, Signal Processing & Computer Applications 2013(C2SPCA-2013), pp. 71, October 10-11, 2013.
  12. Avala Ramesh and S. Pallem Setty, "Analyis on biometric encryption using RSA algorithm," Published In the International Journal Multidiciplnery Educational and Research, Volume 1 – Issue Number 3, pp. 33-39, October 2013.
  13. Xiao Qin, et, "Improving Security of Real-Time Wireless Networks Through Packet Scheduling," IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 9, pp. 3273-3279, September 2008.
  14. Rajesh Duvvuru, Sunil Kumar Singh, G. Narasimha Rao, Ashok Kote, B. Bala Krishna and M. Vijaya Raju, "Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA," In Proc. Of QSHINE 2013, LNICST 115,Springer, pp. 185–196, January, 2013.
  15. Rajesh Duvvuru, P. Jagadeeswara Rao, Sunil Kumar Singh and Ankita Sinha, "Enhanced Security levels of BSPS in WLAN", Published In the International Journal of Computer Applications, Volume 84 - Number 2, pp. 33-39, December 2013.
  16. Zhongjian Zhao and Xiaoqiang Zhang. "ECC-Based Image Encryption Using Code Computing. . " Proceedings of the 2012 International Conference on Communication, Electronics and Automation Engineering Advances in Intelligent Systems and Computing, Volume 181, Springer, pp 859-865, 2013
  17. Yaobin Mao and Guanrong Chen. "Chaos-Based Image Encryption. " Applications in Pattern Recognition, Computer Vision, Neuralcomputing, and Robotics, Springer, pp 231-265, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Bio-Cryptography Quality-of-Security ASPS SPSS Biometrics Security Level Enhanced Merged Bio-cryptic Security- Aware Packet Scheduling-Algorithm Bio-cryptic Security-Aware Packet Scheduling-Algorithm BSPS EBSPS MMBSPS.