Enhancing the Security Levels in WLAN via Novel IBSPS

Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 28)

Abstract

Need of wireless technology increasing day to day due to the rapid development in information and communications technology. Threats and attacks are also growing in accordance with the increment in the usage of wireless communication technology. Especially Wireless Local Area Networks (WLAN) are less sensitive to the security attacks. This work combines the image processing and speech processing techniques. This work introduces Improved Bio-cryptic security aware packet scheduling (IBSPS) algorithm to enhance security levels in WLAN. To strengthen the authentication mechanism this work replaces the existing Enhanced Bio-cryptic security packet scheduling algorithm (EBSPS) with the IBSPS algorithm. In addition biometric encryption of features like finger print, Iris, Palm print and Face. IBSPS adds one more bio-cryptic security in the form of human voice as security level. Simulation were made on Matlab software and results prove that the proposed IBSPS security is stronger than the existing EBSPS and Bio-cryptic security aware packet scheduling (BSPS).

Keywords

Bio-cryptography Wireless LAN Bio-cryptic security aware packet scheduling Enhanced Bio-cryptic security aware packet scheduling security in WLAN 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
  3. 3.
    Lapiotis, G., Kim, B., Das, S., Anjum, F.: A policy-based approach to wireless LAN security management. In: Proceedings of 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, pp. 181–189 (2005)Google Scholar
  4. 4.
    Ali, H.B., Karim, M.R., Ashraf, M., Powers, D.M.W.: Modeling and verification of Extensible Authentication Protocol for Transport layer Security in Wireless LAN environment. In: Proceedings of Second International Conference on Software Technology and Engineering, pp. 41–45 (2010)Google Scholar
  5. 5.
    Duvvuru, R., Rao, P.J., Singh, S.K., Sinha, A.: Enhanced Security levels of BSPS in WLAN. The International Journal of Computer Applications 84(2), 33–39 (2013)CrossRefGoogle Scholar
  6. 6.
    Xi, K., Hu, J.: Bio-Cryptography. In: Handbook of Information and Communication Security, pp. 129–157 (2010)Google Scholar
  7. 7.
    Scheffer, N., Ferrer, L., Lawson, A., Lei, Y.: Recent developments in voice biometrics: Robustness and high accuracy. In: Proceedings of IEEE International Conference on Technologies for Homeland Security (HST), pp. 447–452 (2013)Google Scholar
  8. 8.
    Qin, X.: Improving Security of Real-Time Wireless Networks Through Packet Scheduling. IEEE Transactions on Wireless Communications 7(9), 3273–3279 (2008)CrossRefGoogle Scholar
  9. 9.
    Duvvuru, R., Singh, S.K., Rao, G.N., Kote, A., Krishna, B.B., Raju, M.V.: Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA. In: Singh, K., Awasthi, A.K. (eds.) QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 115, pp. 185–196. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  10. 10.
    Duvvuru, R., Rao, P.J., Singh, S.K.: Improvizing Security levels in WLAN via Novel BSPS. In: Proceedings of IEEE International Conference on Emerging Trends in Communication, Control, Signal Processing and Computer Applications (2013)Google Scholar
  11. 11.
    Duvvuru, R., Rao, P.J., Singh, S.K., Sinha, A.: Enhanced Security levels of BSPS in WLAN. International Journal of Computer Applications 84(2), 33–39 (2013)CrossRefGoogle Scholar
  12. 12.
    Ramesh, A., Setty, S.P.: Analysis on biometric encryption using RSA algorithm. International Journal Multidisciplinary Educational and Research 1(3), 302–307 (2013)Google Scholar
  13. 13.
    Adams, R.H., Calif, S.V.: Voice Encryption System. US Patient No. 4,232,194 (1980)Google Scholar
  14. 14.
    Chumchu, P., Phayak, A., Dokpikul, P.: A simple and cheap end-to-end voice encryption framework over GSM-based networks. In: Proceedings of IEEE International Conference on Computing, Communications and Applications Conference, pp. 210–214 (2012)Google Scholar
  15. 15.
    Sankaran, V.M., Singh, R.: Hierarchical Fusion for Matching Simultaneous Latent Fingerprint. In: Proceedings of International Conference on Biometrics: Theory, Applications and Systems (2012)Google Scholar
  16. 16.
    Ajay Kumar, A., Passi, A.: Comparison and combination of iris matchers for reliable personal authentication. Pattern Recognition 43(3), 1016–1026 (2010)CrossRefMATHGoogle Scholar
  17. 17.
    Kumar, A., Shekhar, S.: Personal Identification using Rank-level Fusion. IEEE Trans. Systems, Man, and Cybernetics: Part C41(5), 743–752 (2011)Google Scholar
  18. 18.
    Jain, V., Mukherjee, A.: The Indian Face Database (2002)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNational Institute of TechnologyJamshedpurIndia

Personalised recommendations