Abstract
Today, wireless networks are significantly expanding in the current world, various security protocols have been introduced to secure the transmission of information, such as IEEE802.11i protocol. In data transfer management, only the 32-bit Cyclic Redundancy Check (CRC) algorithm has been used, which is only applied to detect the error in the transmission of data. Therefore, the unsafe data transfer allows attackers to perform different types of attacks and destructive efforts, particularly in Denial-Of-Service (DOS) and Man-In-Middle (MitM) attacks. In this paper, a new asymmetric cryptographic algorithm is presented to improve the security of the IEEE802.11i protocol. The experimental results showed that the proposed method has optimal performance than other approaches such as a fuzzy method.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs41870-019-00319-5/MediaObjects/41870_2019_319_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs41870-019-00319-5/MediaObjects/41870_2019_319_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs41870-019-00319-5/MediaObjects/41870_2019_319_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs41870-019-00319-5/MediaObjects/41870_2019_319_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs41870-019-00319-5/MediaObjects/41870_2019_319_Fig5_HTML.png)
Similar content being viewed by others
References
Kumar K, Prakash A, Tripathi R (2016) Spectrum handoff in cognitive radio networks: a classification and comprehensive survey. J Netw Comput Appl 61:161–188
Ma Y, Ning H (2018). The improvement of wireless LAN security authentication mechanism based on Kerberos. In: 2018 international conference on electronics technology (ICET), 2018, IEEE
Eskola M, Heikkilä T (2016) Classification of radio channel disturbances for industrial wireless sensor networks. Ad Hoc Netw 42:19–33
Xie X, Wang W (2013) Detecting primary user emulation attacks in cognitive radio networks via physical layer network coding. Proc Comput Sci 21:430–435
Bloessl B et al (2015) Timings matter: standard compliant IEEE 802.11 channel access for a fully software-based SDR architecture. ACM SIGMOBILE Mob Comput Commun Rev 18(3): 81–90
Dong Q et al (2018) An adaptive primary user emulation attack detection mechanism for cognitive radio networks. In: International conference on security and privacy in communication systems, 2018, Springer
Astaneh SA (2014) and S. Gazor Relay-assisted spectrum sensing. IET Commun 8:11–18
Fauzi A, Khan A (2017) Threats advancement in primary user emulation attack and spectrum sensing data falsification (SSDF) attack in cognitive radio network (CRN) for 5G wireless network environment. J Telecommun Electron Comput Eng (JTEC) 9(2-10):179–183
Saberi I et al (2011) Enhanced AES-CCMP key structure in IEEE 80211i. In: Proceedings of 2011 international conference on computer science and network technology, 2011
Parvin S et al (2012) Cognitive radio network security: a survey. J Netw Comput Appl 35(6):1691–1708
Elderini T, Kaabouch N, Reyes H (2017) Channel quality estimation metrics in cognitive radio networks: a survey. IET Commun 11:1173–1179
Sbeiti M, Wietfeld C (2014) One stone two birds: on the security and routing in wireless mesh networks. In: 2014 IEEE wireless communications and networking conference (WCNC), 2014
Abdalzaher MS, Seddik K, Muta O (2017) Using Stackelberg game to enhance cognitive radio sensor networks security. IET Commun 11:1503–1511
Frankel S, Eydt B, Owens L, Scarfone K (2007) Establishing wireless robust security networks: a guide to IEEE 802.11 i. National Institute of Standards and Technology, USA
Lo BF, Akyildiz IF (2013) Reinforcement learning for cooperative sensing gain in cognitive radio ad hoc networks. Wirel Netw 19(6):1237–1250
Hori Y, Sakurai K (2006) Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i. In: Proceedings of the 3rd international conference on mobile technology, applications & systems, 2006, ACM: Bangkok, Thailand, p 11
Abdulnabi MS, Ahmed H (2018) Design of efficient cyclic redundancy check-32 using FPGA. In: 2018 International conference on computer, control, electrical, and electronics engineering (ICCCEEE), 2018
Chandu Y et al (2017) Design and implementation of hybrid encryption for security of IOT data. In: 2017 International conference on smart technologies for smart nation (SmartTechCon), 2017
Mathukiya HH, Patel NM (2012) A novel approach for parallel CRC generation for high speed application. In: 2012 International conference on communication systems and network technologies, 2012
Rifà-Pous H, Garrigues C (2012) Authenticating hard decision sensing reports in cognitive radio networks. Comput Netw 56(2):566–576
Baldini G et al (2012) Security aspects in software defined radio and cognitive radio networks: a survey and a way ahead. IEEE Commun Surv Tutor 14(2):355–379
Sahana A, Misra is (2011). Implementation of RSA security protocol for sensor network security: design and network lifetime analysis. In: 2011 2nd International Conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (Wireless VITAE), 2011
Maity SP, Chatterjee S, Acharya T (2016) On optimal fuzzy c-means clustering for energy efficient cooperative spectrum sensing in cognitive radio networks. Digit Signal Process 49:104–115
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shafiabadi, M.H., Souri, A., Ghasempour, A. et al. A security-based asymmetric cryptographic algorithm to improve IEEE802.11i protocol. Int. j. inf. tecnol. 11, 821–827 (2019). https://doi.org/10.1007/s41870-019-00319-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-019-00319-5