Preview

Security Features Used for Heterogeneous Networks in Wireless Architecture

Powerful Essays
Open Document
Open Document
3434 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Features Used for Heterogeneous Networks in Wireless Architecture
ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print)

IJCST Vol. 3, ISSue 1, Jan. - MarCh 2012

Security Features used for Heterogeneous Networks in Wireless Architecture
1

Arshi Shamsi, 2Saoud Sarwar, 3Shamim Ahmad, 4Shahroukh Khan
2

IIMT Engineering College, Meerut, UP, India Al-Falah School of Engineering & Technology 3 Integral University, Lucknow, UP, India 4 APTECH, New Delhi, India
1

Abstract The ever-increasing demand of users for various wireless communication services has lead to the development and to the coexistence of different, and often incompatible, wireless networks. Each one of these wireless networks has its own unique application and characteristics, as compared to other networks. Moreover, each network continues to evolve individually, most frequently not in a coordinated manner with other networks, further reducing compatibility among these networks. An integrated security mechanism is one of the key challenges in the Open Wireless network Architecture (OWA) because of the diversity of the wireless networks in OWA and the unique security mechanism used in each one of these networks. The overall security of the network is as strong as its weakest component; integration of the overall security mechanism in OWA is of primary importance. In this paper, we comparatively analyze the unique network-centric features and security mechanisms of various heterogeneous wireless networks that are expected to be a part of OWA. Keywords Wireless Architecture, OWA, Security, Heterogeneous Networks I. Introduction The ever-increasing demand of users for various wireless communication services has lead to the development and to the coexistence of different, and often incompatible, wireless networks. Each one of these wireless networks has its own unique application and characteristics, as compared to other networks. Moreover, each network continues to evolve individually, most frequently not in a coordinated manner with other networks, further



References: [1] W. W. Lu,“Open Wireless Architecture and Its Enhanced Performance”, IEEE Commun. Mag., Vol. 41, No. 6, June 2003, pp. 106–07. [2] A. Shamir,“Identity-Based Cryptosystems and Signature Schemes”, Proc. CRYPTO ’84, LNCS196, Springer-Verlag, 1985, pp. 48–53. [3] G. M. Koien,“An Introduction to Access Security in UMTS,” IEEE Wireless Commun., Vol. 11, No. 1, Feb. 2004, pp. 8–18. [4] J. C. Chen, M. C. Jiang, Y. W. Liu,“Wireless LAN Security and IEEE802.11i,” IEEE Wireless Commun., Vol. 12, No. 1, Feb. 2005, pp.27–36. [5] L. Zhou, Z. J. Haas,“Securing Ad-Hoc Networks,“IEEE Network, Vol. 13, No. 6, Nov./Dec. 1999. [6] P. Papadimitratos, Z. J. Haas,“Secure Routing for Mobile Ad-Hoc Networks”, Proc. SCS Commun. Networks and Distrib. Sys. Modeling and Simulation Conf., Jan. 2002, pp. 27–31. [7] M. G. Zapata,“Secure Ad-Hoc On-Demand Distance Vector Routing”, ACM Mobile Comp. Commun. Rev., Vol. 6, No. 3, July 2002, pp.106-07. [8] A. Juels et al.,“Minimalist Cryptography for Low-Cost RFID Tags”, Proc. 4th Int’l. Conf. Security in Commun. Networks, LNCS 3352, Springer-Verlag, 2004, pp-149-64. [9] Bok Yong Choi, Deok Gyu Lee,“RHDP-Scheme for RFID’s Efficiency Improvement on the Ubiquitous Computing”, SpringerLink, Vol. 344/2006,4, Oct 2006, pp. 1068-1077. Arshi Shamsi received his B.Tech. degree in computer science from Vira College of Engineering,(from U.P.T.U. Lucknow) Bijnor, India, in 2004 and pursuing M.Tech. degree in Computer Science from Al-Falah School of Engineering and Technology,(Maharishi Dayanand University, Rohtak) Haryana. He is working as Assistant Professor, with Department of Computer Science, at IIMT Engineering College. He is having a total work experience of 7 years. Shahroukh Khan received his B.Tech. degree in computer science & Engg from Shri Ram Murti Smarak College of Engineering & Technology, Bareilly, India, in 2007 and pursuing M.Tech(CSE) Degree in Computer Science from Al-Falah School of Engineering & Technology (M. D. University, Rohtak, Haryana). He is working as Lecturer, with Department of Computer Science & Engineering, at Integral University, Lucknow. He is having a total work experience of 4.5 years. Shamim Ahmad received his B.E. degree in Computer Engg from Faculty of Engg.& Technology, Jamia Millia Islamia(Central University), India, in 2009 and pursuing M.Tech. Degree in Computer Science Engg. from Alfalah School of Engg.& Technology,Faridabad (affliated to Maharishi Dayanand University, Rohtak, Haryana). He is working as Software Trainer, with Aptech Ltd. He is having a total work Saoud Sarwar received his M.Tech (IT) from Allahabad Agriculture University in 2004. Currently he is pursuing Ph.D from Bhagwant University, Ajmer (Rajasthan). He is working as Head of department in Al-Falah School of Engineering & Technology. He is also working as M.Tech (CSE) coordinator. He is having experience of more than 7 years. He has published numerous research papers in National & International Conferences. experience of 2 years. 410 InternatIonal Journal of Computer SCIenCe and teChnology w w w. i j c s t. c o m

You May Also Find These Documents Helpful

  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231-…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Kendall, J., Dr. (2008, June). Cryptographic Techniques for Network Security. University of Portsmouth. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Assess and design proper authentication methods for RADIUS and TACACs+ authentication servers deployments as well as IEEE 802.11 WLAN infrastructures…

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Bs311 Unit 3 Essay

    • 3508 Words
    • 15 Pages

    Designing secure key distribution in an ad-hoc network might be an extremely hard task. Any reliance on a certificate of authority is not trivial at all, for the same reasons that reliance in any centralized authority is problematic. Additional problems include the increased packet sizes required by authentication extensions, unicast/multicast routing, Quality of Service support and power aware routing. Furthermore, due to the limited transmission range of wireless network interfaces, multiple hops may be needed to exchange data between nodes in the network (c.f.…

    • 3508 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Network Infrastructure

    • 2917 Words
    • 12 Pages

    Bibliography: Anil Khatod, A. I. (2004, November 4). Five Steps To WLAN Security -- A Layered Approach. Retrieved June 1, 2012, from www.computerworld.com: http://www.computerworld.com/s/article/97178/Five_Steps_To_WLAN_Security_A_Layered_Approach…

    • 2917 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    wireshark

    • 452 Words
    • 3 Pages

    The project this week involved a deeper dive into the packet structure for the wireless protocol. Identifying the Authentication and Authorization was trickier than it appeared initially. Identifying the authentication and ciphers can come in handy when trying to identify an endpoint is not being allowed on the internet which is a frequent problem in a secure location.…

    • 452 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    eviltwinattack

    • 3867 Words
    • 15 Pages

    According to a recent study, 42% of wireless 802.11 access points (APs) provide no security mechanisms — not even WEP or WPA [1]. Often times, wireless APs are left open for convenience. For example, a coffee shop or bookstore may wish to offer a free wireless service, so there is no need to authenticate its wireless users. However, wireless clients that use these APs are vulnerable to a number of trivial threats such as eavesdropping and injection attacks. An additional and often over-looked vulnerability caused by using open APs is the access point impersonation attack.…

    • 3867 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Wireless Security

    • 3481 Words
    • 14 Pages

    Wireless devices, like all technologies that provide external access to corporate networks, present security challenges. With wireless standards and practices still rapidly evolving, it is important to understand the strengths and limitations of available technologies in order to implement a secure solution. Extending current security policies to encompass wireless devices requires an understanding of the security features of both wireless devices and wireless networks.…

    • 3481 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Csr Case Study

    • 6604 Words
    • 27 Pages

    Shri Ram Murti Smarak College of Engineering & Technology, Bareilly, U P/India ) Career Degree College, kakori, Lucknow /U P / University of Lucknow / India)…

    • 6604 Words
    • 27 Pages
    Good Essays
  • Better Essays

    Djfjd

    • 841 Words
    • 4 Pages

    Sl. No. |CC |College Name |Ht No |Name |Marks |Year |Semester | |1 |A2 |SWARNANDHRA COLL. OF ENGG AND TECH., SITARAMAPURAM, NARSAPUR |11A21A0136 |MARUMOGAM METHU SHELARAJ |1534 |2 |1 | |2 |KD |LENDI INST OF ENGG AND TECHNOLOGY,JONNADA,DENKADA, VZNM |11KD1A0286 |PUSAPATI VENKATA NARAYANA VARMA |1606 |2 |1 | |3 |33 |M V G R COLLEGE OF ENGINEERNG,CHINTALAVALASA, VIZIANAGARAM |11331A03B2 |NANDILLA LAVANYA |1592 |2 |1 | |4 |JR |KKR AND KSR INST OF TECH AND SCI, VINJANAMPADU, GUNTUR |11JR1A04A9 |SHAIK YUSUF VALI |1627 |2 |1 | |5 |L3 |VIGNAN'S INSTITUTE OF INFO TECH., VADLAPUDI, VISAKHAPATNAM |11L31A0568 |NAKKA SURAJ |1626 |2 |1 | |6 |34 |G M R INSTITUTE OF TECH., RAJAM |11341A0826 |LALITA BHARATULA |1487 |2 |1 | |7 |A5 |ADITYA INSTITUTE OF TECH. AND MANG, TEKKALI |11A51A1029 |SANKU LATHA RANI |1271 |2 |1 | |8 |JG |GAYATHRI VIDYA PARISHAD COLL OF ENGG FOR WOMEN, VISAKHAPATNA |11JG1A1113 |TAMVADA SANTHI SRILEKHA |1382 |2 |1 | |9 |L3 |VIGNAN'S INSTITUTE OF INFO TECH., VADLAPUDI, VISAKHAPATNAM |11L31A1237 |SOMBHATLA TEJASWI |1547 |2 |1 | |10 |50 |PRASAD V POTLURI SIDDHARTHA INSTITUTE OF TECH.,KANURU, VIJAY |11501A1902 |ALURU NAGA MARUTHI JAYA LAKSHMI |1485 |2 |1 | |11 |50 |PRASAD V POTLURI SIDDHARTHA INSTITUTE OF TECH.,KANURU, VIJAY |11501A2128 |YAGNEM ANILREDDY |1433 |2 |1 | |12 |NT |VISAKHA INST OF ENGG AND TECH, NARVA, VISAKHAPATNAM |11NT1A2405 |KRISHNA BAHADUR BAM |1434 |2 |1 | |13 |55 |GODAVARI INST. OF ENGG. & TECH.,CHAITANYANAGAR,RAJAHMUNDRY |11551A2637 |VANTALA NARESH BABU |1339 |2 |1 | |14 |A9 |ADITYA ENGG. COLLEGE, SURAMPALEM, PEDDAPURAM |11A91A2736 |TADIMETI NRUSIMHA HARAKARTHEEK |1417 |2 |1 | |15 |34 |G M R INSTITUTE OF TECH., RAJAM |11341A3003 |BIBIN VARGHESE |1167 |2 |1 | |16 |50 |PRASAD V POTLURI SIDDHARTHA INSTITUTE OF TECH.,KANURU, VIJAY |09501A0124 |KILARU DIVYA |3662 |4 |1 | |17 |49 |QIS COLLEGE OF ENGG. & TECH., VENGAMUKKAPALEM, ONGOLE |09491A0265…

    • 841 Words
    • 4 Pages
    Better Essays
  • Better Essays

    References: [1] J. Yick, B. Mukherjee, D. Ghosal, Wireless sensor network survey, Comput. Networks 52 (12) 2292–2330 (2008). [2] Suat Ozdemir a, Yang Xiao, Secure data aggregation in wireless sensor networks: A comprehensive overview, Computer Networks. 53, 2022–2037 (2009) [3] Wei Zhang, Yonghe Liu, Sajal K. Das, Pradip De, Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach, Pervasive and Mobile Computing. 4, 658–680 (2008) [4] S. Zhu, S. Setia, S. Jajodia, P. Ning, An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, in: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, pp. 260–272 (2004) [5] Wen TaoZhu, Jianying Zhou, Robert H. Deng, Feng Bao, Detecting node replication attacks in wireless sensor networks: A survey, Computer Networks 53, 945–960 (2009) [6] A. Perrig, R. Szewczyk, D. Tygar, V. Wen, D. Culler, SPINS: security protocols for sensor networks, Wireless Networks J. (WINE) 2 (5), 521 –534 (2002).…

    • 2530 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Institute of Information Technology Kohat University of Science & Technology (KUST) Kohat, Pakistan Email: hafeezullahamin@gmail.com…

    • 4660 Words
    • 19 Pages
    Powerful Essays