Advertisement

International Journal of Information Technology

, Volume 11, Issue 4, pp 821–827 | Cite as

A security-based asymmetric cryptographic algorithm to improve IEEE802.11i protocol

  • Mohammad Hossein Shafiabadi
  • Alireza SouriEmail author
  • Abolghasem Ghasempour
  • Fereshteh Asgari
Original Research
  • 11 Downloads

Abstract

Today, wireless networks are significantly expanding in the current world, various security protocols have been introduced to secure the transmission of information, such as IEEE802.11i protocol. In data transfer management, only the 32-bit Cyclic Redundancy Check (CRC) algorithm has been used, which is only applied to detect the error in the transmission of data. Therefore, the unsafe data transfer allows attackers to perform different types of attacks and destructive efforts, particularly in Denial-Of-Service (DOS) and Man-In-Middle (MitM) attacks. In this paper, a new asymmetric cryptographic algorithm is presented to improve the security of the IEEE802.11i protocol. The experimental results showed that the proposed method has optimal performance than other approaches such as a fuzzy method.

Keywords

Cognitive radio networks IEEE802.11i protocol Security DOS MitM 

References

  1. 1.
    Kumar K, Prakash A, Tripathi R (2016) Spectrum handoff in cognitive radio networks: a classification and comprehensive survey. J Netw Comput Appl 61:161–188CrossRefGoogle Scholar
  2. 2.
    Ma Y, Ning H (2018). The improvement of wireless LAN security authentication mechanism based on Kerberos. In: 2018 international conference on electronics technology (ICET), 2018, IEEEGoogle Scholar
  3. 3.
    Eskola M, Heikkilä T (2016) Classification of radio channel disturbances for industrial wireless sensor networks. Ad Hoc Netw 42:19–33CrossRefGoogle Scholar
  4. 4.
    Xie X, Wang W (2013) Detecting primary user emulation attacks in cognitive radio networks via physical layer network coding. Proc Comput Sci 21:430–435CrossRefGoogle Scholar
  5. 5.
    Bloessl B et al (2015) Timings matter: standard compliant IEEE 802.11 channel access for a fully software-based SDR architecture. ACM SIGMOBILE Mob Comput Commun Rev 18(3): 81–90CrossRefGoogle Scholar
  6. 6.
    Dong Q et al (2018) An adaptive primary user emulation attack detection mechanism for cognitive radio networks. In: International conference on security and privacy in communication systems, 2018, SpringerGoogle Scholar
  7. 7.
    Astaneh SA (2014) and S. Gazor Relay-assisted spectrum sensing. IET Commun 8:11–18CrossRefGoogle Scholar
  8. 8.
    Fauzi A, Khan A (2017) Threats advancement in primary user emulation attack and spectrum sensing data falsification (SSDF) attack in cognitive radio network (CRN) for 5G wireless network environment. J Telecommun Electron Comput Eng (JTEC) 9(2-10):179–183Google Scholar
  9. 9.
    Saberi I et al (2011) Enhanced AES-CCMP key structure in IEEE 80211i. In: Proceedings of 2011 international conference on computer science and network technology, 2011Google Scholar
  10. 10.
    Parvin S et al (2012) Cognitive radio network security: a survey. J Netw Comput Appl 35(6):1691–1708CrossRefGoogle Scholar
  11. 11.
    Elderini T, Kaabouch N, Reyes H (2017) Channel quality estimation metrics in cognitive radio networks: a survey. IET Commun 11:1173–1179CrossRefGoogle Scholar
  12. 12.
    Sbeiti M, Wietfeld C (2014) One stone two birds: on the security and routing in wireless mesh networks. In: 2014 IEEE wireless communications and networking conference (WCNC), 2014Google Scholar
  13. 13.
    Abdalzaher MS, Seddik K, Muta O (2017) Using Stackelberg game to enhance cognitive radio sensor networks security. IET Commun 11:1503–1511CrossRefGoogle Scholar
  14. 14.
    Frankel S, Eydt B, Owens L, Scarfone K (2007) Establishing wireless robust security networks: a guide to IEEE 802.11 i. National Institute of Standards and Technology, USACrossRefGoogle Scholar
  15. 15.
    Lo BF, Akyildiz IF (2013) Reinforcement learning for cooperative sensing gain in cognitive radio ad hoc networks. Wirel Netw 19(6):1237–1250CrossRefGoogle Scholar
  16. 16.
    Hori Y, Sakurai K (2006) Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i. In: Proceedings of the 3rd international conference on mobile technology, applications & systems, 2006, ACM: Bangkok, Thailand, p 11Google Scholar
  17. 17.
    Abdulnabi MS, Ahmed H (2018) Design of efficient cyclic redundancy check-32 using FPGA. In: 2018 International conference on computer, control, electrical, and electronics engineering (ICCCEEE), 2018Google Scholar
  18. 18.
    Chandu Y et al (2017) Design and implementation of hybrid encryption for security of IOT data. In: 2017 International conference on smart technologies for smart nation (SmartTechCon), 2017Google Scholar
  19. 19.
    Mathukiya HH, Patel NM (2012) A novel approach for parallel CRC generation for high speed application. In: 2012 International conference on communication systems and network technologies, 2012Google Scholar
  20. 20.
    Rifà-Pous H, Garrigues C (2012) Authenticating hard decision sensing reports in cognitive radio networks. Comput Netw 56(2):566–576CrossRefGoogle Scholar
  21. 21.
    Baldini G et al (2012) Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead. IEEE Commun Surv Tutor 14(2):355–379CrossRefGoogle Scholar
  22. 22.
    Sahana A, Misra is (2011). Implementation of RSA security protocol for sensor network security: design and network lifetime analysis. In: 2011 2nd International Conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (Wireless VITAE), 2011Google Scholar
  23. 23.
    Maity SP, Chatterjee S, Acharya T (2016) On optimal fuzzy c-means clustering for energy efficient cooperative spectrum sensing in cognitive radio networks. Digit Signal Process 49:104–115CrossRefGoogle Scholar

Copyright information

© Bharati Vidyapeeth's Institute of Computer Applications and Management 2019

Authors and Affiliations

  1. 1.Department of Computer Engineering, Islamshahr BranchIslamic Azad UniversityIslamshahrIran
  2. 2.Young Researchers and Elite Club, Islamshahr BranchIslamic Azad UniversityIslamshahrIran

Personalised recommendations