Preview

Security Features Used for Heterogeneous Networks in Wireless Architecture

Powerful Essays
Open Document
Open Document
3434 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Features Used for Heterogeneous Networks in Wireless Architecture
ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print)

IJCST Vol. 3, ISSue 1, Jan. - MarCh 2012

Security Features used for Heterogeneous Networks in Wireless Architecture
1

Arshi Shamsi, 2Saoud Sarwar, 3Shamim Ahmad, 4Shahroukh Khan
2

IIMT Engineering College, Meerut, UP, India Al-Falah School of Engineering & Technology 3 Integral University, Lucknow, UP, India 4 APTECH, New Delhi, India
1

Abstract The ever-increasing demand of users for various wireless communication services has lead to the development and to the coexistence of different, and often incompatible, wireless networks. Each one of these wireless networks has its own unique application and characteristics, as compared to other networks. Moreover, each network continues to evolve individually, most frequently not in a coordinated manner with other networks, further reducing compatibility among these networks. An integrated security mechanism is one of the key challenges in the Open Wireless network Architecture (OWA) because of the diversity of the wireless networks in OWA and the unique security mechanism used in each one of these networks. The overall security of the network is as strong as its weakest component; integration of the overall security mechanism in OWA is of primary importance. In this paper, we comparatively analyze the unique network-centric features and security mechanisms of various heterogeneous wireless networks that are expected to be a part of OWA. Keywords Wireless Architecture, OWA, Security, Heterogeneous Networks I. Introduction The ever-increasing demand of users for various wireless communication services has lead to the development and to the coexistence of different, and often incompatible, wireless networks. Each one of these wireless networks has its own unique application and characteristics, as compared to other networks. Moreover, each network continues to evolve individually, most frequently not in a coordinated manner with other networks, further



References: [1] W. W. Lu,“Open Wireless Architecture and Its Enhanced Performance”, IEEE Commun. Mag., Vol. 41, No. 6, June 2003, pp. 106–07. [2] A. Shamir,“Identity-Based Cryptosystems and Signature Schemes”, Proc. CRYPTO ’84, LNCS196, Springer-Verlag, 1985, pp. 48–53. [3] G. M. Koien,“An Introduction to Access Security in UMTS,” IEEE Wireless Commun., Vol. 11, No. 1, Feb. 2004, pp. 8–18. [4] J. C. Chen, M. C. Jiang, Y. W. Liu,“Wireless LAN Security and IEEE802.11i,” IEEE Wireless Commun., Vol. 12, No. 1, Feb. 2005, pp.27–36. [5] L. Zhou, Z. J. Haas,“Securing Ad-Hoc Networks,“IEEE Network, Vol. 13, No. 6, Nov./Dec. 1999. [6] P. Papadimitratos, Z. J. Haas,“Secure Routing for Mobile Ad-Hoc Networks”, Proc. SCS Commun. Networks and Distrib. Sys. Modeling and Simulation Conf., Jan. 2002, pp. 27–31. [7] M. G. Zapata,“Secure Ad-Hoc On-Demand Distance Vector Routing”, ACM Mobile Comp. Commun. Rev., Vol. 6, No. 3, July 2002, pp.106-07. [8] A. Juels et al.,“Minimalist Cryptography for Low-Cost RFID Tags”, Proc. 4th Int’l. Conf. Security in Commun. Networks, LNCS 3352, Springer-Verlag, 2004, pp-149-64. [9] Bok Yong Choi, Deok Gyu Lee,“RHDP-Scheme for RFID’s Efficiency Improvement on the Ubiquitous Computing”, SpringerLink, Vol. 344/2006,4, Oct 2006, pp. 1068-1077. Arshi Shamsi received his B.Tech. degree in computer science from Vira College of Engineering,(from U.P.T.U. Lucknow) Bijnor, India, in 2004 and pursuing M.Tech. degree in Computer Science from Al-Falah School of Engineering and Technology,(Maharishi Dayanand University, Rohtak) Haryana. He is working as Assistant Professor, with Department of Computer Science, at IIMT Engineering College. He is having a total work experience of 7 years. Shahroukh Khan received his B.Tech. degree in computer science & Engg from Shri Ram Murti Smarak College of Engineering & Technology, Bareilly, India, in 2007 and pursuing M.Tech(CSE) Degree in Computer Science from Al-Falah School of Engineering & Technology (M. D. University, Rohtak, Haryana). He is working as Lecturer, with Department of Computer Science & Engineering, at Integral University, Lucknow. He is having a total work experience of 4.5 years. Shamim Ahmad received his B.E. degree in Computer Engg from Faculty of Engg.& Technology, Jamia Millia Islamia(Central University), India, in 2009 and pursuing M.Tech. Degree in Computer Science Engg. from Alfalah School of Engg.& Technology,Faridabad (affliated to Maharishi Dayanand University, Rohtak, Haryana). He is working as Software Trainer, with Aptech Ltd. He is having a total work Saoud Sarwar received his M.Tech (IT) from Allahabad Agriculture University in 2004. Currently he is pursuing Ph.D from Bhagwant University, Ajmer (Rajasthan). He is working as Head of department in Al-Falah School of Engineering & Technology. He is also working as M.Tech (CSE) coordinator. He is having experience of more than 7 years. He has published numerous research papers in National & International Conferences. experience of 2 years. 410 InternatIonal Journal of Computer SCIenCe and teChnology w w w. i j c s t. c o m

You May Also Find These Documents Helpful

  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231-…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Kendall, J., Dr. (2008, June). Cryptographic Techniques for Network Security. University of Portsmouth. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Network Infrastructure

    • 2917 Words
    • 12 Pages

    Bibliography: Anil Khatod, A. I. (2004, November 4). Five Steps To WLAN Security -- A Layered Approach. Retrieved June 1, 2012, from www.computerworld.com: http://www.computerworld.com/s/article/97178/Five_Steps_To_WLAN_Security_A_Layered_Approach…

    • 2917 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Assess and design proper authentication methods for RADIUS and TACACs+ authentication servers deployments as well as IEEE 802.11 WLAN infrastructures…

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Bs311 Unit 3 Essay

    • 3508 Words
    • 15 Pages

    Designing secure key distribution in an ad-hoc network might be an extremely hard task. Any reliance on a certificate of authority is not trivial at all, for the same reasons that reliance in any centralized authority is problematic. Additional problems include the increased packet sizes required by authentication extensions, unicast/multicast routing, Quality of Service support and power aware routing. Furthermore, due to the limited transmission range of wireless network interfaces, multiple hops may be needed to exchange data between nodes in the network (c.f.…

    • 3508 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    References: Rowan, T (2010), Negotiating WiFi security, Network Security, Vol. 2010, Issue 2, pp. 8–12.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Csr Case Study

    • 6604 Words
    • 27 Pages

    Shri Ram Murti Smarak College of Engineering & Technology, Bareilly, U P/India ) Career Degree College, kakori, Lucknow /U P / University of Lucknow / India)…

    • 6604 Words
    • 27 Pages
    Good Essays
  • Better Essays

    Djfjd

    • 841 Words
    • 4 Pages

    Sl. No. |CC |College Name |Ht No |Name |Marks |Year |Semester | |1 |A2 |SWARNANDHRA COLL. OF ENGG AND TECH., SITARAMAPURAM, NARSAPUR |11A21A0136 |MARUMOGAM METHU SHELARAJ |1534 |2 |1 | |2 |KD |LENDI INST OF ENGG AND TECHNOLOGY,JONNADA,DENKADA, VZNM |11KD1A0286 |PUSAPATI VENKATA NARAYANA VARMA |1606 |2 |1 | |3 |33 |M V G R COLLEGE OF ENGINEERNG,CHINTALAVALASA, VIZIANAGARAM |11331A03B2 |NANDILLA LAVANYA |1592 |2 |1 | |4 |JR |KKR AND KSR INST OF TECH AND SCI, VINJANAMPADU, GUNTUR |11JR1A04A9 |SHAIK YUSUF VALI |1627 |2 |1 | |5 |L3 |VIGNAN'S INSTITUTE OF INFO TECH., VADLAPUDI, VISAKHAPATNAM |11L31A0568 |NAKKA SURAJ |1626 |2 |1 | |6 |34 |G M R INSTITUTE OF TECH., RAJAM |11341A0826 |LALITA BHARATULA |1487 |2 |1 | |7 |A5 |ADITYA INSTITUTE OF TECH. AND MANG, TEKKALI |11A51A1029 |SANKU LATHA RANI |1271 |2 |1 | |8 |JG |GAYATHRI VIDYA PARISHAD COLL OF ENGG FOR WOMEN, VISAKHAPATNA |11JG1A1113 |TAMVADA SANTHI SRILEKHA |1382 |2 |1 | |9 |L3 |VIGNAN'S INSTITUTE OF INFO TECH., VADLAPUDI, VISAKHAPATNAM |11L31A1237 |SOMBHATLA TEJASWI |1547 |2 |1 | |10 |50 |PRASAD V POTLURI SIDDHARTHA INSTITUTE OF TECH.,KANURU, VIJAY |11501A1902 |ALURU NAGA MARUTHI JAYA LAKSHMI |1485 |2 |1 | |11 |50 |PRASAD V POTLURI SIDDHARTHA INSTITUTE OF TECH.,KANURU, VIJAY |11501A2128 |YAGNEM ANILREDDY |1433 |2 |1 | |12 |NT |VISAKHA INST OF ENGG AND TECH, NARVA, VISAKHAPATNAM |11NT1A2405 |KRISHNA BAHADUR BAM |1434 |2 |1 | |13 |55 |GODAVARI INST. OF ENGG. & TECH.,CHAITANYANAGAR,RAJAHMUNDRY |11551A2637 |VANTALA NARESH BABU |1339 |2 |1 | |14 |A9 |ADITYA ENGG. COLLEGE, SURAMPALEM, PEDDAPURAM |11A91A2736 |TADIMETI NRUSIMHA HARAKARTHEEK |1417 |2 |1 | |15 |34 |G M R INSTITUTE OF TECH., RAJAM |11341A3003 |BIBIN VARGHESE |1167 |2 |1 | |16 |50 |PRASAD V POTLURI SIDDHARTHA INSTITUTE OF TECH.,KANURU, VIJAY |09501A0124 |KILARU DIVYA |3662 |4 |1 | |17 |49 |QIS COLLEGE OF ENGG. & TECH., VENGAMUKKAPALEM, ONGOLE |09491A0265…

    • 841 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    This paper will describe about the brief introduction of the old and dynamic method employed for network security that is cryptography. Cryptographic technique is widely applicable in network security field but still we are suffering from hacking and unauthorized access. Hence we have introduced a new idea for being applicable in security field that is RFID technique. Here we will describe its various applications in various fields and how it can be implemented in network security. The security and privacy issues of RFID and their solutions will also be discussed. And the future possible ideas for the new technologies like PPTN (point to point tunneling protocol) and VPN (virtual private network) with their applications in network security will also be discussed.…

    • 1385 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    References: [1] J. Yick, B. Mukherjee, D. Ghosal, Wireless sensor network survey, Comput. Networks 52 (12) 2292–2330 (2008). [2] Suat Ozdemir a, Yang Xiao, Secure data aggregation in wireless sensor networks: A comprehensive overview, Computer Networks. 53, 2022–2037 (2009) [3] Wei Zhang, Yonghe Liu, Sajal K. Das, Pradip De, Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach, Pervasive and Mobile Computing. 4, 658–680 (2008) [4] S. Zhu, S. Setia, S. Jajodia, P. Ning, An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, in: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, pp. 260–272 (2004) [5] Wen TaoZhu, Jianying Zhou, Robert H. Deng, Feng Bao, Detecting node replication attacks in wireless sensor networks: A survey, Computer Networks 53, 945–960 (2009) [6] A. Perrig, R. Szewczyk, D. Tygar, V. Wen, D. Culler, SPINS: security protocols for sensor networks, Wireless Networks J. (WINE) 2 (5), 521 –534 (2002).…

    • 2530 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Introduction A network that allows two wireless devices to communicate with the help of other wireless devices that lie within range of each other. Challenges Lack of resources The absence of a central node High mobility Different devices and platforms Leads to Key distribution problem Coping with attacks What model to use…

    • 701 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Institute of Information Technology Kohat University of Science & Technology (KUST) Kohat, Pakistan Email: hafeezullahamin@gmail.com…

    • 4660 Words
    • 19 Pages
    Powerful Essays