Skip to main content
Log in

Wireless Network Security Based on the Image Address Masking (IAM) Mechanism

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Addressing plays vital role in the communication of wired and wireless network. We proposed masking of internet protocol (IP) address by using the image abstraction of the mobile user. Every image is with independent Gray scale values varying from image to image. User defined mask for image generates address providing authenticity to each user in the network. We simulated the 32-bit address generated from an image and inserted and tested through real world deployment using Matlab Simulink environment. This will provide secured addressing mechanism and will be used as a unique identity to access a network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Brahima, S. (2015). The world in 2015—ICT Facts and Figures. International Telecommunication Union.

  2. Abusubaih, M. (2012). Mutual interference between Bluetooth and 802.11n MIMO devices. In 19h international conference on telecommunications (ICT) (pp. 1–5). Jounieh.

  3. Das, S., et al. (2009). IEEE 802.21: Media independent handover: Features, applicability, and realization. IEEE Communications Magazine, 47(1), 112–120.

    Article  Google Scholar 

  4. Moon, B. (2014). Fast and secure session mobility in IMS-based vertical handover scenario. International Journal of Multimedia and Ubiquitous, Engineering, 9(9), 171–188.

    Article  Google Scholar 

  5. Hsu, A. C. C., Wei, D. S., & Kuo, C. C. J. (2015). Coexistence wi-fi MAC design for mitigating interference caused by collocated bluetooth. IEEE Transactions on Computers, 64(2), 342–352.

    Article  MathSciNet  Google Scholar 

  6. Ernst, J. B., Nasser, N., & Rodrigues J. (2012). Co-channel interference modelling between RATs in heterogeneous wireless networks. In IEEE international of conference on communications (ICC) (pp. 5321–5325). Ottawa, ON.

  7. Bian, V., & Park J.-M. J. (2012). Ecology-inspired coexistence of heterogeneous wireless networks. In IEEE global communications conference (GLOBECOM) (pp. 4921–4926). Atlanta, GA.

  8. Mach, P., Becvar, Z., & Vanek, T. (2012). In-band device-to-device communication in OFDMA cellular networks: A survey and challenges. IEEE Communications Surveys and Tutorials, 17(4), 1885–1922.

    Article  Google Scholar 

  9. Krishna, B. M., & Tamma, B. R. (2012). An enhanced media independent handover framework for heterogeneous wireless networks. In 12th international conference on intelligent systems design and applications (ISDA) (pp. 610–615). Kochi.

  10. Puttonen, J., Fekete, G., Makela, J., Hamalainen, T., & Narikka, J. (2005). Using link layer information for improving vertical handovers. In Pers. Indoor Mob. Radio Commun. PIMRC. IEEE 16th Int. Symp. (pp. 1747–1752). Berlin

  11. Singh, R. K., Asthana, A., & Balyan, A. (2012). Vertical handoffs in fourth generation wireless networks. International Journal of Soft Computing and Engineering, 2, 481–490.

    Google Scholar 

  12. RFC 791. Internet protocol, 1981.

  13. MATLAB and Statistics Toolbox Release (2014). The MathWorks, Inc., Natick, Massachusetts, United States.

  14. http://in.mathworks.com/help/matlab/ref/rgb2Gray.html.

  15. Gonzalez, R. C., & Woods, R. E. (2002). Digital image processing. Pearson Education, 3, 112–115.

    Google Scholar 

  16. Bellens, R., Douterloigne, K., Gautama, S., & Philips, W. (2008). Per pixel contextual information for classification of VHR images of urban areas. International Geoscience and Remote Sensing Symposium, 4(1), 522–525.

    Google Scholar 

  17. Himayat, N., Yeh, S., Ali Panah, Y., & Talwar, S. (2014). Multi-radio heterogeneous networks: Architectures and performance. In International conference on computing, networking and communications (pp. 252–257). Honolulu.

  18. Salwe, S. S., & Naik, K. K. (2017). Discrete image data transmission in heterogeneous wireless network using vertical handover mechanism. IET Image Processing, 11(7), 550–558.

    Article  Google Scholar 

  19. Salwe, S. S., & Naik, K. K. (2016). Advanced heterogeneous wireless communication technique using vertical handover scenario. In IEEE international conference on next generation intelligent systems (ICNGIS) (pp. 1–5). Kottayam.

  20. Stuedi, P., & Alonso, G. (2005). Transparent heterogeneous mobile ad hoc networks. In 2nd annual international conference on mobile and ubiquitous systems: Networks and services (pp. 237–246). San Diego.

  21. Schmidt, R. D. O., Gomes, R., Sadok, D., Kelner, J., & Johnsson, M. (2009). An autonomous addressing mechanism as support for auto-configuration in dynamic networks. In Network operations and management symposium (pp. 1–12). Punta Del Este: LANOMS Latin American.

  22. Vidales, P., et al. (2004). Experiences with heterogeneous wireless networks, unveiling the challenges. In Proceedings of 2nd international working conference on performance modeling and evaluation of heterogeneous networks.

  23. Lin, C. R., Wang, G. M., & Dad, A. W. (2005). A duplicate address resolution protocol in mobile ad hoc networks. IEEE Journal of Communication and Network, 7(4), 525–536.

    Article  Google Scholar 

  24. Leng, C. K. (2008). JPEG image steganalysis improvement via image-to-image variation minimization. In International conference on advanced computer theory and engineering ICACTE (pp. 223–227). Fuket.

  25. Ghosh, U., & Datta, R. (2015). A secure addressing scheme for large-scale managed MANETs. IEEE Transactions on Network and Service Management, 12(3), 483–495.

    Article  Google Scholar 

Download references

Acknowledgements

This work is being carried out in Communication Laboratory, Electronics Engineering Department, Defence Institute of Advance Technology Pune. The authors thank anonymous reviewers for their valuable comments and constructive suggestions. The authors also thank Mr. Ajit Singh, Mr. Sathish Nayak from communication laboratory in Electronics Engineering for their help in statistical analysis and necessary corrections. This work was supported by the Defence Institute of Advanced Technology, Pune.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sagar Shriram Salwe.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Salwe, S.S., Naik, K.K. Wireless Network Security Based on the Image Address Masking (IAM) Mechanism. Wireless Pers Commun 101, 23–40 (2018). https://doi.org/10.1007/s11277-018-5664-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5664-y

Keywords

Navigation