Skip to main content
Log in

A security-based asymmetric cryptographic algorithm to improve IEEE802.11i protocol

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

Today, wireless networks are significantly expanding in the current world, various security protocols have been introduced to secure the transmission of information, such as IEEE802.11i protocol. In data transfer management, only the 32-bit Cyclic Redundancy Check (CRC) algorithm has been used, which is only applied to detect the error in the transmission of data. Therefore, the unsafe data transfer allows attackers to perform different types of attacks and destructive efforts, particularly in Denial-Of-Service (DOS) and Man-In-Middle (MitM) attacks. In this paper, a new asymmetric cryptographic algorithm is presented to improve the security of the IEEE802.11i protocol. The experimental results showed that the proposed method has optimal performance than other approaches such as a fuzzy method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Kumar K, Prakash A, Tripathi R (2016) Spectrum handoff in cognitive radio networks: a classification and comprehensive survey. J Netw Comput Appl 61:161–188

    Article  Google Scholar 

  2. Ma Y, Ning H (2018). The improvement of wireless LAN security authentication mechanism based on Kerberos. In: 2018 international conference on electronics technology (ICET), 2018, IEEE

  3. Eskola M, Heikkilä T (2016) Classification of radio channel disturbances for industrial wireless sensor networks. Ad Hoc Netw 42:19–33

    Article  Google Scholar 

  4. Xie X, Wang W (2013) Detecting primary user emulation attacks in cognitive radio networks via physical layer network coding. Proc Comput Sci 21:430–435

    Article  Google Scholar 

  5. Bloessl B et al (2015) Timings matter: standard compliant IEEE 802.11 channel access for a fully software-based SDR architecture. ACM SIGMOBILE Mob Comput Commun Rev 18(3): 81–90

    Article  Google Scholar 

  6. Dong Q et al (2018) An adaptive primary user emulation attack detection mechanism for cognitive radio networks. In: International conference on security and privacy in communication systems, 2018, Springer

  7. Astaneh SA (2014) and S. Gazor Relay-assisted spectrum sensing. IET Commun 8:11–18

    Article  Google Scholar 

  8. Fauzi A, Khan A (2017) Threats advancement in primary user emulation attack and spectrum sensing data falsification (SSDF) attack in cognitive radio network (CRN) for 5G wireless network environment. J Telecommun Electron Comput Eng (JTEC) 9(2-10):179–183

    Google Scholar 

  9. Saberi I et al (2011) Enhanced AES-CCMP key structure in IEEE 80211i. In: Proceedings of 2011 international conference on computer science and network technology, 2011

  10. Parvin S et al (2012) Cognitive radio network security: a survey. J Netw Comput Appl 35(6):1691–1708

    Article  Google Scholar 

  11. Elderini T, Kaabouch N, Reyes H (2017) Channel quality estimation metrics in cognitive radio networks: a survey. IET Commun 11:1173–1179

    Article  Google Scholar 

  12. Sbeiti M, Wietfeld C (2014) One stone two birds: on the security and routing in wireless mesh networks. In: 2014 IEEE wireless communications and networking conference (WCNC), 2014

  13. Abdalzaher MS, Seddik K, Muta O (2017) Using Stackelberg game to enhance cognitive radio sensor networks security. IET Commun 11:1503–1511

    Article  Google Scholar 

  14. Frankel S, Eydt B, Owens L, Scarfone K (2007) Establishing wireless robust security networks: a guide to IEEE 802.11 i. National Institute of Standards and Technology, USA

    Book  Google Scholar 

  15. Lo BF, Akyildiz IF (2013) Reinforcement learning for cooperative sensing gain in cognitive radio ad hoc networks. Wirel Netw 19(6):1237–1250

    Article  Google Scholar 

  16. Hori Y, Sakurai K (2006) Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i. In: Proceedings of the 3rd international conference on mobile technology, applications & systems, 2006, ACM: Bangkok, Thailand, p 11

  17. Abdulnabi MS, Ahmed H (2018) Design of efficient cyclic redundancy check-32 using FPGA. In: 2018 International conference on computer, control, electrical, and electronics engineering (ICCCEEE), 2018

  18. Chandu Y et al (2017) Design and implementation of hybrid encryption for security of IOT data. In: 2017 International conference on smart technologies for smart nation (SmartTechCon), 2017

  19. Mathukiya HH, Patel NM (2012) A novel approach for parallel CRC generation for high speed application. In: 2012 International conference on communication systems and network technologies, 2012

  20. Rifà-Pous H, Garrigues C (2012) Authenticating hard decision sensing reports in cognitive radio networks. Comput Netw 56(2):566–576

    Article  Google Scholar 

  21. Baldini G et al (2012) Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead. IEEE Commun Surv Tutor 14(2):355–379

    Article  Google Scholar 

  22. Sahana A, Misra is (2011). Implementation of RSA security protocol for sensor network security: design and network lifetime analysis. In: 2011 2nd International Conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (Wireless VITAE), 2011

  23. Maity SP, Chatterjee S, Acharya T (2016) On optimal fuzzy c-means clustering for energy efficient cooperative spectrum sensing in cognitive radio networks. Digit Signal Process 49:104–115

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alireza Souri.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shafiabadi, M.H., Souri, A., Ghasempour, A. et al. A security-based asymmetric cryptographic algorithm to improve IEEE802.11i protocol. Int. j. inf. tecnol. 11, 821–827 (2019). https://doi.org/10.1007/s41870-019-00319-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-019-00319-5

Keywords

Navigation