IJCST Vol. 3, ISSue 1, Jan. - MarCh 2012
Security Features used for Heterogeneous Networks in Wireless Architecture
1
Arshi Shamsi, 2Saoud Sarwar, 3Shamim Ahmad, 4Shahroukh Khan
2
IIMT Engineering College, Meerut, UP, India Al-Falah School of Engineering & Technology 3 Integral University, Lucknow, UP, India 4 APTECH, New Delhi, India
1
Abstract The ever-increasing demand of users for various wireless communication services has lead to the development and to the coexistence of different, and often incompatible, wireless networks. Each one of these wireless networks has its own unique application and characteristics, as compared to other networks. Moreover, each network continues to evolve individually, most frequently not in a coordinated manner with other networks, further reducing compatibility among these networks. An integrated security mechanism is one of the key challenges in the Open Wireless network Architecture (OWA) because of the diversity of the wireless networks in OWA and the unique security mechanism used in each one of these networks. The overall security of the network is as strong as its weakest component; integration of the overall security mechanism in OWA is of primary importance. In this paper, we comparatively analyze the unique network-centric features and security mechanisms of various heterogeneous wireless networks that are expected to be a part of OWA. Keywords Wireless Architecture, OWA, Security, Heterogeneous Networks I. Introduction The ever-increasing demand of users for various wireless communication services has lead to the development and to the coexistence of different, and often incompatible, wireless networks. Each one of these wireless networks has its own unique application and characteristics, as compared to other networks. Moreover, each network continues to evolve individually, most frequently not in a coordinated manner with other networks, further
References: [1] W. W. Lu,“Open Wireless Architecture and Its Enhanced Performance”, IEEE Commun. Mag., Vol. 41, No. 6, June 2003, pp. 106–07. [2] A. Shamir,“Identity-Based Cryptosystems and Signature Schemes”, Proc. CRYPTO ’84, LNCS196, Springer-Verlag, 1985, pp. 48–53. [3] G. M. Koien,“An Introduction to Access Security in UMTS,” IEEE Wireless Commun., Vol. 11, No. 1, Feb. 2004, pp. 8–18. [4] J. C. Chen, M. C. Jiang, Y. W. Liu,“Wireless LAN Security and IEEE802.11i,” IEEE Wireless Commun., Vol. 12, No. 1, Feb. 2005, pp.27–36. [5] L. Zhou, Z. J. Haas,“Securing Ad-Hoc Networks,“IEEE Network, Vol. 13, No. 6, Nov./Dec. 1999. [6] P. Papadimitratos, Z. J. Haas,“Secure Routing for Mobile Ad-Hoc Networks”, Proc. SCS Commun. Networks and Distrib. Sys. Modeling and Simulation Conf., Jan. 2002, pp. 27–31. [7] M. G. Zapata,“Secure Ad-Hoc On-Demand Distance Vector Routing”, ACM Mobile Comp. Commun. Rev., Vol. 6, No. 3, July 2002, pp.106-07. [8] A. Juels et al.,“Minimalist Cryptography for Low-Cost RFID Tags”, Proc. 4th Int’l. Conf. Security in Commun. Networks, LNCS 3352, Springer-Verlag, 2004, pp-149-64. [9] Bok Yong Choi, Deok Gyu Lee,“RHDP-Scheme for RFID’s Efficiency Improvement on the Ubiquitous Computing”, SpringerLink, Vol. 344/2006,4, Oct 2006, pp. 1068-1077. Arshi Shamsi received his B.Tech. degree in computer science from Vira College of Engineering,(from U.P.T.U. Lucknow) Bijnor, India, in 2004 and pursuing M.Tech. degree in Computer Science from Al-Falah School of Engineering and Technology,(Maharishi Dayanand University, Rohtak) Haryana. He is working as Assistant Professor, with Department of Computer Science, at IIMT Engineering College. He is having a total work experience of 7 years. Shahroukh Khan received his B.Tech. degree in computer science & Engg from Shri Ram Murti Smarak College of Engineering & Technology, Bareilly, India, in 2007 and pursuing M.Tech(CSE) Degree in Computer Science from Al-Falah School of Engineering & Technology (M. D. University, Rohtak, Haryana). He is working as Lecturer, with Department of Computer Science & Engineering, at Integral University, Lucknow. He is having a total work experience of 4.5 years. Shamim Ahmad received his B.E. degree in Computer Engg from Faculty of Engg.& Technology, Jamia Millia Islamia(Central University), India, in 2009 and pursuing M.Tech. Degree in Computer Science Engg. from Alfalah School of Engg.& Technology,Faridabad (affliated to Maharishi Dayanand University, Rohtak, Haryana). He is working as Software Trainer, with Aptech Ltd. He is having a total work Saoud Sarwar received his M.Tech (IT) from Allahabad Agriculture University in 2004. Currently he is pursuing Ph.D from Bhagwant University, Ajmer (Rajasthan). He is working as Head of department in Al-Falah School of Engineering & Technology. He is also working as M.Tech (CSE) coordinator. He is having experience of more than 7 years. He has published numerous research papers in National & International Conferences. experience of 2 years. 410 InternatIonal Journal of Computer SCIenCe and teChnology w w w. i j c s t. c o m