CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Proposing of Collisions Free and Secure Network for IEEE 802.11 WLAN

by Mohd. Izhar, V. R. Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 5
Year of Publication: 2014
Authors: Mohd. Izhar, V. R. Singh
10.5120/17179-7274

Mohd. Izhar, V. R. Singh . Proposing of Collisions Free and Secure Network for IEEE 802.11 WLAN. International Journal of Computer Applications. 98, 5 ( July 2014), 22-26. DOI=10.5120/17179-7274

@article{ 10.5120/17179-7274,
author = { Mohd. Izhar, V. R. Singh },
title = { Proposing of Collisions Free and Secure Network for IEEE 802.11 WLAN },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 5 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 22-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number5/17179-7274/ },
doi = { 10.5120/17179-7274 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:25:24.952255+05:30
%A Mohd. Izhar
%A V. R. Singh
%T Proposing of Collisions Free and Secure Network for IEEE 802.11 WLAN
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 5
%P 22-26
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

IEEE 802. 11 wireless network contains various problems such as packets delay and drop because of collision due to the heavy traffic. Packets are dropped either by the buffer overflow or by the MAC layer contentions. Such packet losses decrease throughput. Packet delay is also a result of poor utilization of network capacity when it is integrated with routing algorithms. Routing protocol contains very serious security issues in adhoc network. SAODV, SEAR and SEED protocols are used for solutions. But when some security measures are taken it may results in decreasing the throughput. Even network security in infrastructure mode for Wi-Fi point is of great concern where pre-RSNA as well as RSNA methods fail to provide proper security. This paper simulates such problems in NS2 and proposes the model of securing and increasing the throughput with least delay. .

References
  1. IEEE Std 802. 11™-2007, Revision of IEEE Std 802. 11-1999, IEEE 3 Park Avenue New York, NY 10016-5997, USA 12 June 2007.
  2. IEEE Std. 2009 Revision of IEEE Std 802. 11™-2007, 30 Sept. 2009.
  3. Changhua He & John C Mitchell "Security Analysis and Improvements for IEEE 802. 11i", Network and Distributed System Security Symposium, San Diego, California, 3-4 February 2005.
  4. Shivaputrappa Vibhuti, "IEEE 802. 11 WEP (Wired Equivalent Privacy) Concepts and Vulnerability" , San Jose State University, CA, USA, CS265 Spring 2005 (26. 03. 2005)
  5. NETGEAR, Inc. "Wireless Networking Basics", October 2005.
  6. Lu Zhengqiu; Tian Si; Wang Ming; Ye Peisong; Chen Qingzhang; "Security analysis and recommendations for Wireless LAN 802. 11b network", Consumer Electronics, Communications and Networks (CECNet), 2011 International Conference on 16-18 April 2011.
  7. Finn Michael Halvorsen & Olav Haugen "Cryptanalysis of IEEE 802. 11i TKIP", Norwegian University of Science and Technology, June 2009.
  8. IEEE Std 802. 11i-2004, Amendment to IEEE Std 802. 11™, 1999 Edition (Reaff 2003) as amended by IEEE Stds 802. 11a™-1999, 802. 11b™-1999,802. 11b™-1999/Cor 1-2001, 802. 11d™-2001, 802. 11g-2003, and 802. 11h-2003] Amendment 6: Medium Access Control (MAC) Security Enhancements, 23 July 2004.
  9. Back and Tews "Practical attacks against WEP and WPA", November 8, 2008.
  10. Paul Arana, "Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2)", INFS 612 – Fall 2006
  11. Behrouz A. Forouzan "Data Communication and Networking", McGraw-Hill Forouzan Networking Series, Fourth Edition Copyright © 2007.
  12. NIST Special Publication 800-97, "Establishing Wireless Robust Security Networks: A Guide to IEEE 802. 11i", February 2007.
  13. Diaa Salama Abd Elminaam1, Hatem Mohamed Abdual Kader, and Mohiy Mohamed Hadhoud, "Evaluating The Performance of Symmetric Encryption Algorithms", International Journal of Network Security, Vol. 10, No. 3, PP. 213{219, May 2010
  14. A. K. M. Nazmus Sakib et al"Security Improvement of WPA 2 (Wi-Fi Protected Access 2)" (IJEST), Vol. 3 No. 1 Jan 2011
  15. Vijay Chandramouli, "A Detailed Study on Wireless LAN Technologies", 23. 10. 2002
  16. "Understanding the New WPA TKIP Attack Vulnerabilities & Motorola WLAN Countermeasures", Motorola, Inc. 2008.
  17. Dajiang He, Charles. Q. Shen. "Simulation study of IEEE 802. 11e EDCF" 2003
  18. Ismahnsi Binti Ismail, "Study of Enhanced DCF(EDCF) in Multimedia Application", 2005
  19. Preeti Venkateswaran, "Experiments to Develop Configurable Protocols", 2005
  20. Mark Greis, Tutorial for the Network Simulator "ns" 2008
  21. Lecture notes 2003-2004 University de Los Andes, Merida, Venezula and ESSI Sophia-Antipols, France.
  22. Guillermo Alonso Pequeño Javier Rocha Rivera, "Extension to MAC 802. 11 for performance improvement in MANET", 2007
  23. Sam De Silva, Using TCP "Effectively in Mobile Ad-hoc Wireless Networks with Rate Adaptation", 2007
  24. Turkan Ahamad & Manar Younis "The Enhancement of Routing Security in Mobile Ad-hoc Networks", IJCA(0975 – 888),Volume 48– No. 16, June 2012.
  25. Payal Pahwa, Gaurav Tiwari, Rashmi Chhabra "Spoofing Media Access Control (MAC) and its Counter Measures", IJAEA, Jan. 2010 .
  26. Farhad Soleimanian & Zeinab Abbasi "Analysis and Evaluation of Dynamic Load Balancing in IEEE 802. 11b Wireless Local Area" , IJCA(0975 – 888), Volume 47– No. 22, June 2012.
  27. Joshua Wright "Detecting Wireless LAN MAC Address Spoofing", 2003.
  28. Fanglu Guo and Tzi-cker Chiueh " Sequence Number-Based MAC Address Spoof Detection", 2005.
  29. Stuart Compton, SANS Institute, "802. 11 Denial of Service Attacks and Mitigation", May 2007.
  30. D. Gupta, G. Tiwari,Y. K and P. Kumar "Media Access Control (MAC) MAC Spoofing and its Counter Measure", IJRTE, 2009
  31. Siemens Enterprise Communications, "WLAN Security Today: Wireless more Secure than Wired", white paper July 2008.
  32. Website :http://computer. howstuffworks. com, May 2014
  33. Website :http:// milesweb. com , MAY 2014
  34. Website : http://www. technitium. com, MAY 2014
  35. Website : http://www. klcconsulting. net/smac.
  36. Website: http://www. softpedia. com/ get/ Network-Tools/ IP-Tools/ IPScan-II. shtml
  37. Website : http://ip-scan. qarchive. org/, MAY 2014
  38. Website: ww. radmin. com/products/ipscanner,MAY 2014
  39. Website : http://www. angryip. org/w/Home, MAY 2014
  40. Website : http://www. opnet. com/itguru-academic
  41. Website : http://www. wikipedia. org. MAY 2014.
  42. Website : http://www. aircrack-ng. org. MAY 2014
  43. Website : http://www. makeuseof. com
  44. website : http://Microsoft. com/india, MAY 2014
  45. Website :http:/ Cisco. com MAY 2014
  46. Preeti Venkateswaran, Experiments To Develop Configurable Protocols 2009
  47. Richa Bansal, Siddharth Tiwari, Divya Bansal "Non-cryptographic methods of MAC spoof detection in wireless LAN", ICON 2008: 1-6.
  48. Guenther Lackner, Udo Payer, and Peter Teu, " Combating Wireless LAN MAC-Layer Address Spoofing with Fingerprinting Methods", January 20, 2009.
  49. Hassene Bouhouche & Sihem Guemara, "A QoS-based Resources Reservation Mechanism for Ad Hoc Networks", IJCA (0975 – 8887), Volume 6– No. 3, September 2010
  50. CERT-In Monthly Security Bulletin- February 2012, website : http://www. cert-in. org. in
  51. Mohd. Izhar, Mohd. Shahid & Dr. V. R. Singh"A Practical Approach for Evaluation of Security Methods of Wireless Network" for Vol. 4, No. 10 , October 2013 E-ISSN 2218-6301/ ISSN 2079-8407
  52. Mohd. Izhar, Mohd. Shahid & Dr. V. R. Singh, " Reliable and Secure wifi Performance model by way of cryptography and RSNA" , 6th International Conference on Quality, Reliability, Infocom Technology and Industrial Technology Management (ICQRITITM 2012) held at Delhi University, 26-28 Nov. 2012.
  53. Mohd. Izhar, Mohd. Shahid & Dr. V. R. Singh, "Network Security Vulnerabilities heading for malicious attack" IJCA Special Edition for CTNGC 2012, Nov 2012
  54. Mohd. Izhar, Mohd. Shahid & Dr. V. R. Singh, "Design & Modeling of Manet using different slot time simulated by NS-2", International Journal on Computer Science & Engineering(IJCSE), ISSN : 0975-3397, Vol. 3 No. 5 May 2011
  55. Mohd. Izhar, Mohd. Shahid & Dr. V. R. Singh "Enhanced Security Evaluation and Analysis of Wireless Network based on MAC Protocol", published for Nov. 2013 issue at International Journal of Scientific and Research Publications(IJSRP), ISSN 2250-3153.
  56. Mohd Izhar, Amit Prkash Singh & Dr. Rafat Parveen "Performance Model for Campus Area Network Based On Mac Protocol" (Paper No - P574) at "International Conference on Innovative Technologies (ICIT-09): held on June18, 19 2009 at PDM College of Engineering, Bahadurgarh Sponsored by IEEE
Index Terms

Computer Science
Information Sciences

Keywords

ad hoc network LAN mobility radio frequency wired wireless Network and IEEE 802. 11 AODV SAODV.