SlideShare a Scribd company logo
1 of 9
Download to read offline
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012


     Providing Security to Wireless Packet Networks by using
                   Optimized Security Method
                              N. Paparayudu*     G. Suresh Kumar J.Srikanth
         Aurora’s Engineering College, Raigir, Bhongir, Nalgonda Dist, Andhra Pradesh, India.
    * E-mail of the corresponding author: rayudu8_n@yahoo.co.in


Abstract
Now-a-days technology is growing very fast, due to rapid development of the technology in computer
arena, communication through network become a habit to the users. Communication through network is
happen using two channels i.e., by connection oriented and connection less. At present users prefer wireless
networks for communication and transferring data due to its flexibility. So in this paper we are focusing on
wireless networking, as it is not reliable we are proposing an optimized security technique to provide
security to the communication on wireless. In this paper we mainly focus on packet scheduling which plays
the vital role in the transmission of data over wireless networks. We are using optimized security technique
to secure the packets at initial level itself while scheduling the packets.
Keywords: Real-Time Packets, Packet Scheduling, Wireless Networks, Security, Cryptography, Secret
key, Bandwidth.

1. Introduction
The quirky thing about a wireless network is that you cannot always see what you are dealing with. In a
wireless network, establishing connectivity is not a simple task like plugging in a cable, providing physical
security is not easy by keeping unauthorized individuals out of a facility, and troubleshooting even trivial,
issues can sometimes result in a few expletives being thrown in the general direction of an access point. [4]
It should be noted that supporting efficient and reliable data transmission, especially real time data
transmission, over wireless networks is extremely difficult and challenging because wireless networks must
be facing more complicated environments compared with conventional wired networks.
For instance, wireless networks could be disturbed by radio wave and thunderstorms or blocked by physical
objects like mountains or skyscrapers. Even worse, high mobility coupled with a variety of explosively
increased users makes existing security policies in wireless networks inefficient or even useless, meaning
that wireless networks can be easily attacked by computer viruses, worms, spy wares, and similar threats.
These security threats cause downtime or continual patching in wireless networks and thus lead to severe
disruption in wireless commercial business. Therefore, boosting security of wireless networks has become
one of the most important issues in the arena of wireless communications. [1]
With the rapid growth of needs for wireless multimedia applications and wireless data services, it is
expected that the future broadband wireless networks will support the transmission of heterogeneous
classes of traffic (e.g., realtime and non-realtime traffic flows). The design of broadband wireless networks
introduces a set of challenging technical issues. Among all these issues that need to be resolved, packet
scheduling problem is one of the most important. It is well known that, the bandwidth resource of wireless
networks is very scarce. Scheduling algorithms, which are in charge of the bandwidth allocation and
multiplexing, have major influence on the network performance. [2]
However, in packet cellular environments, user mobility and wireless channel error make it very difficult to
perform either resource reservation or fair packet scheduling. While there have been some recent efforts to
provide resource reservation for mobile flows in packet cellular networks, the problem of fair packet
scheduling in wireless networks has remained largely unaddressed. In fact, even the notion of fairness in
shared channel wireless networks has not been precisely defined. [3]
At the packet level wireless networks are similar to wired networks in most ways. Wireless networks still
use TCP/IP for data communication and abide by all of the same laws of networking as wired hosts. The
major difference between the two networking platforms is found at the lower layers of the OSI model.


                                                     30
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
Wireless networks communicate by sending data over the air as opposed to sending data across a wire. The
air that wireless data is communicated on is a shared medium, and because of that special consideration
must be given at the physical and data link layers to ensure that there are no data collisions and that data
can be delivered reliably. These services are provided by different mechanisms of the 802.11 standard. [4]
The primary difference between wireless and wired packets is the addition of the 802.11 header. This is a
layer two header that contains extra information about the packet and the medium it is transmitted on.
There are three types of 802.11 packets; data, management, and control.
   Management - These packets are used to establish connectivity between hosts at layer two. Some
important subtypes of management packets include authentication, association, and beacon packets.
   Control - Control packets allow for delivery of management and data packets and are concerned with
congestion management. Common subtypes include Request-to-Send and Clear-to-Send packets.
   Data - These packets contain actual data and are the only packet type that can be forwarded from the
wireless network to the wired network. [4]
In this paper we are proposing a blow fish security technique to encrypt the data packets at the time of
packet scheduling is done, due to this decryption of the packet will not be possible by the attacker on the
packet even though the packets are delay.
That being said, securing wireless networks will continue to be a challenge for the foreseeable future.


2. Related Work
In the literature, there are many schemes and protocols devoted to deal with the problem of packet
scheduling. We broadly classify existing scheduling algorithms into three categories. A brief introduction of
them follows.

2 2.1. Algorithms in wire line environment:
Algorithms of first come- first-served (FCFS) and round robin (RR) are first developed for wire line
networks. Their original versions and improved versions (e.g., Weighted Round Robin and Deficit Round
Robin) are underlying schemes for wireless networks because of the simplicity and ease of implementation.
Their drawback lies in the lack of consideration on the issues of bandwidth utilization and fairness
guarantee.

3 2.2. Algorithms in wireless environment with GE-model:
The classical two-state Gilbert-Eilliot (GE) model is firstly used to model the wireless link variation. The
channel is simply described to be either in “good” or “bad” state in this model. A survey of this class of
scheduling algorithms can be found in [5]. Work in [6] devised Idealized Weight Fair Queuing (IWFQ)
algorithm. In [7], Channel-condition Independent Fair Queuing (CIF-Q) algorithm was put forward. Both
algorithms of IWFQ and CIF-Q need to simulate a virtual error-free fair queuing system, and try to
schedule packets in the same order as the ideal reference system does. IWFQ and CIF-Q differ in the way
they compensate the lagging flows. Authors of [8] presented Token Bank Fair Queuing (TBFQ) algorithm,
which uses token pools and token bank to keep track of the service status of each flow, and dynamically
regulate the flows’ priorities to occupy the channel resource. All these three algorithms achieve good
performance tradeoff among the three performance issues aforementioned. But they only work under the
GE channel model, which is too coarse to characterize the fluctuation of wireless channel condition.
Since security concern plays a vital role in the design and development of wireless mobile commercial
applications, international wireless organizations, wireless equipment providers and academic researchers
made extreme efforts in maximizing the features of existing security mechanisms and finding innovative
security policies of wireless networks. IEEE improved the security character of 802.11 by designing
802.1X and 802.11i for WLAN [9]. 802.1X, a port-level access control protocol, provides a security
framework for IEEE networks, including Ethernet and wireless networks. The 802.11i standard, also still in
draft, was created for wireless-specific security functions that operate with IEEE 802.1X. Cisco provides
the solutions for wireless applications by using strong encryption technology and providing unified WLAN
[10]. Papers addressing the security problems also provide valuable solutions for wireless business
applications [11] [12] [13] [14].
However, most of the efforts were made at the levels of protocols or systems; most existing approaches
were focused on non-real time wireless applications. Packet scheduling plays an important role in achieving


                                                     31
Network and Complex Systems                                                                    www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
high performance in real-time wireless networks. A real time scheduler needs to guarantee both security and
real-time constraints of packets even in the presence of hardware and software faults [15] [16]. Real time
scheduling algorithms can be classified into static [17] [28] and dynamic [19] [20] strategies.


3. Methodology

4    3.1 Problem Definition
  According to Xiao Qin, Mohamed Alghamdi, Mais Nijim, Ziliang Zong, Kiranmai Bellam, Xiaojun
Ruan, and Adam Manzanares et al, they are concentrating on the delay time of the packet delivery based on
time scheduling; they are providing security at the time administrator identifies the delay of packet. The
motto of this paper is to provide the security at the initial level while the packet is scheduled so that the
attacker cannot do any kind of modification to the packet even though they trace the packet here we are
concentrating on the security of the packet.
In this paper we are discussing how to secure the packet from the attackers instead of depending on the
delay time of the packet and think that the packet is damaged, in the proposed system the duty of the
admission controller is to check with the packet and its structure if it is in the correct format the admission
controller pushes the packet.

5 3.2 Solution
As per the discussions, we are providing security to the packets while the packet is scheduling using
BlowFish algorithm.

6 3.2.1 BlowFish
Blowfish is a variable-length key block cipher. It does not meet all the requirements for a new
cryptographic standard discussed above: it is only suitable for applications where the key does not change
often, like a communications link or an automatic file encryptor. It is significantly faster than DES when
implemented on 32-bit microprocessors with large data caches, such as the Pentium and the PowerPC. [22]
a)        Algorithm
Blowfish is a variable-length key, 64-bit block cipher. The algorithm consists of two parts: a key-expansion
part and a data- encryption part. Key expansion converts a key of at most 448 bits into several sub key
arrays totaling 4168 bytes. Data encryption occurs via a 16-round Feistel network. Each round consists of a
key-dependent permutation, and a key- and data-dependent substitution. All operations are XORs and
additions on 32-bit words. The only additional operations are four indexed array data lookups per
round.[22]
Sub keys: Blowfish uses a large number of sub keys. These keys must be pre-computed before any data
encryption or decryption.
1. The P-array consists of 18 32-bit sub keys:
P1, P2,..., P18.
2. There are four 32-bit S-boxes with 256 entries each:
S1,0, S1,1,..., S1,255;
S2,0, S2,1,..,, S2,255;
S3,0, S3,1,..., S3,255;
S4,0, S4,1,..,, S4,255.
The exact method used to calculate these sub keys will be described later.
Encryption:
Blowfish is a Feistel network consisting of 16 rounds (see Figure 1). The input is a 64-bit data element, x.
Divide x into two 32-bit halves: xL, xR
For i = 1 to 16:
xL = xL XOR Pi
xR = F(xL) XOR xR
Swap xL and xR
Next i
Swap xL and xR (Undo the last swap.)
xR = xR XOR P17


                                                      32
Network and Complex Systems                                                                    www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
xL = xL XOR P18
Recombine xL and xR
Function F (see Figure 2):
Divide xL into four eight-bit quarters: a, b, c, and d
F(xL) = ((S1,a + S2,b mod 232) XOR S3,c) + S4,d mod 232
Decryption is exactly the same as encryption, except that P1, P2,..., P18 are used in the reverse order.
Implementations of Blowfish that require the fastest speeds should unroll the loop and ensure that all sub
keys are stored in cache.
Generating the Subkeys:
The sub keys are calculated using the Blowfish algorithm. The exact method is as follows:
     1. Initialize first the P-array and then the four S-boxes, in order, with a fixed string. This string
          consists of the hexadecimal digits of pi (less the initial 3). For example:
          • P1 = 0x243f6a88
          • P2 = 0x85a308d3
          • P3 = 0x13198a2e
          • P4 = 0x03707344
     2. XOR P1 with the first 32 bits of the key, XOR P2 with the second 32-bits of the key, and so on for
          all bits of the key (possibly up to P14). Repeatedly cycle through the key bits until the entire P-
          array has been XORed with key bits. (For every short key, there is at least one equivalent longer
          key; for example, if A is a 64-bit key, then AA, AAA, etc., are equivalent keys.)
     3. Encrypt the all-zero string with the Blowfish algorithm, using the subkeys described in steps (1)
          and (2).
     4. Replace P1 and P2 with the output of step (3).
     5. Encrypt the output of step (3) using the Blowfish algorithm with the modified subkeys.
     6. Replace P3 and P4 with the output of step (5).
     7. Continue the process, replacing all entries of the P- array, and then all four S-boxes in order, with
          the output of the continuously-changing Blowfish algorithm. [22]
   In total, 521 iterations are required to generate all required sub keys. Applications can store the sub keys
rather than execute this derivation process multiple times.

b)        The system model and assumptions
In recent studies, a system model is proposed for wireless channel as an NN switch. Although each wireless
node may have a single transmitter and a single receiver, it is common that the transmitter and receiver are
combined in a transceiver. As such, a node cannot transmit and receive packages simultaneously. In our
switch model, there exists a packet scheduler matching transmitters to corresponding receivers. The
detailed information regarding the switch model can be found in [21]. In addition to the switch, other three
key components in the system include a Security Level Controller (SLC), an Admission Controller (AC),
and an EDF (Earliest Deadline First) scheduler as depicted in Fig. 1. This architecture is designed for a link
between two nodes in a wireless network. All packets are submitted independently to the wireless link with
arrival rates abided by Poisson distribution. The function of the Admission Controller is to determine
whether incoming packets can be accepted or not. The Security Level Controller aims at increasing security
levels of real-time packets residing in the Accepted queue that can be finished before their deadlines. The
EDF scheduler makes use of the Earliest Deadline First policy to schedule admitted packets in which
security levels are maximized by the Security Level Controller.

c)        The packet model
Our packet model assumes that all packets have soft deadline and each packet is independent of one
another. We also assume that packets’ arrival times follow the classical Poisson distribution. Packet Pi is
represented as a tuple (ATi, PTi, SLi, Di), where ATi and PTi denote the arrival time and the processing time
of packet i. SLi and Di represent the security level and soft deadline of packet i. Besides, without loss of
generality we assume that each packet is assigned a quality of security measured as a security level SLi that
in the range [1, 2,….., 10], where 1 and 10 are the lowest and highest levels of security. For example, if
packet i has a value of 1 as a security level, this means that the packet has the lowest security level.
Although wireless network devices are unable to determine security levels, packets’ security levels can be
straightforwardly derived from the security requirements of applications. [1]

                                                      33
Network and Complex Systems                                                                     www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
To calculate the security overhead without loss of generality, we make use of formula (1) to model the
security overhead envisioned as the extra processing time experienced by packet i.
    SOi = ETi * (SLi/R)
                                                                         (1)
where SOi is the security overhead of packet i, SLi is the security level provided to packet i, ETi is the
transmission time of the packet. And R is set to 10. Thus, the total processing time WLi of packet i can be
expressed as:
                        WLi = ETi + SOi = ETi * (1 + SLi/R)                               (2)
d)         The SPSS Algorithm
The main goal of this study is to maximize the overall system performance, which reflects the guarantee
ratio and security level. To achieve this goal, we designed the SPSS scheduling algorithm with security
awareness. SPSS aims to maintain high guarantee ratios while maximizing the security levels. We can
accomplish high performance and high security level by applying the Security Level Controller to our
SPSS algorithm. Fig. 2 below outlines the flow chart of the security-aware packet-scheduling algorithm
(SPSS) for wireless links. The SPSS algorithm strives to maximize the security level of a packet residing in
the accepted queue while making the best effort to guarantee its deadline. If the deadline of the packet can
be met, the packet will be admitted in the accepted queue. Otherwise, the packet will be dropped and placed
in the rejected queue. The following constraint shows whether the packet is equipped to meet its deadline.
 CTi − STi <= di where STi is the start time of transmission of the ith packet, CTi is the completion time of
the transmission, and di is the packet’s deadline. The packets stored in the accepted queue are scheduled
depending on their specified deadlines, meaning that the packets with earlier deadlines will be processed
first. The SPSS algorithm initializes the security levels of all packets to the minimum levels. Then, SPSS
gradually enhances the security level of each packet Pi under the condition that (1) the current packet Pi
can be transmitted before its deadline; and (2) the deadlines of the packets being processed later than Pi
also can be guaranteed. The above criterion is important and reasonable because if a packet is admitted to
the real-time wireless link, then the packet’s timing constraint has to be guaranteed. In other words, the
SPSS algorithm ensures that an admitted packet is not adversely affected by subsequently admitted packets.
[1]
The following steps delineate the procedure of the SPSS scheduling.
Step 1: initialize the scheduler; the security values of incoming packets; and the number of rejected packets
is set to zero. Wait for any incoming packets.
Step 2: if a packet I arrives and it is the only packet available, process the packet immediately using its
highest security level. The starting time (STi) and the completion time (CTi) of the packet are calculated.
Step 3: All the packets arriving in the scheduler during the time period [STi, CTi] are temporarily stored
into a waiting queue in the non-decreasing order of their deadlines. The starting time of the next packet STi
+ 1 is set to CTi.
Step 4: the admission controller is responsible for deciding whether a packet in the waiting queue can be
accepted by considering the deadline of this packet. If the packet’s deadline and security requirement can
both be guaranteed, the packet will be forwarded into the accepted queue (step 3 and step5). Otherwise,
being put into the rejected queue will drop the packet; the number of rejected packets is increased by one.
Step 5: the security level controller raises the security levels of all the packets residing in the accepted
queue as high as possible. The enhancements of the security levels for real-time packets residing in the
accepted queue are subject to the following two constraints: (1) Increasing of an accepted packet’s security
level should still guarantee the deadline of the packet. (2) The increase of security levels must not lead to
any rejection of currently accepted packet. Step 6: At this point, the security level SLi+1 of the next starting
packet is maximized. The packet’s completion time CTi+1 is calculated. Steps 3-6 are repeatedly executed
until all the arriving packets are processed in one run. [1]

5. Conclusion
Providing security at the time of packet scheduling will help the admission controller to push the packets
instead of wasting time by rejecting the packet and providing the level of security to the packet based on
the rejection. That being said, securing wireless networks will continue to be a challenge for the foreseeable
future.



                                                      34
Network and Complex Systems                                                                  www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
References
[1] Xiao Qin, Mohamed Alghamdi, Mais Nijim, Ziliang Zong, Kiranmai Bellam, Xiaojun Ruan, and Adam
     Manzanares, “Improving Security of Real-Time Wireless Networks Through Packet Scheduling”,
     IEEE Transaction on Wireless Communications, Vol. 7, No. 9, September 2008, Page No: 3273-3279.
[2] Rong Yu, Zhi Sun, and Shunliang Mei , “Packet Scheduling in Broadband Wireless Networks Using
     Neuro-Dynamic Programming”, 1550-2252/$25.00 ©2007 IEEE, page No: 2776-2780.
[3] Songwu Lu, Vaduvur Bharghavan, R. Srikant, “Fair Scheduling in Wireless Packet Networks”,
     IEEE/ACM Transactions on Networking, Vol. 7, No. 4, August 1999. Page No: 473-489.
[4] Chris Sanders, "Analyzing Wireless Network Security at the packet Level", Articles Misc Network
     Security, published on Aug 11, 2010.
[5] Y. Cao and V. O. K. Li, “Scheduling algorithm in broad-band wireless networks,” in Proc. of the IEEE
     vol. 89, no. 1, pp. 76-87, Jan. 200l.
[6] S. Lu and V. Bharghavan, “Fair scheduling in wireless packet networks,” IEEE/ACM Trans.
     Networking, vol. 7, no. 4, pp. 473-489, 1999.
[7] T. S. Eugene Ng, I. Stoica, and H. Zhang, “Packet fair queueing algorithms for wireless networks with
     location-dependent errors,” in Proc. INFOCOM98, pp. 1103-1111, Mar. 1998.
[8] W. K. Wong, J. Zhu, and V. C. M. Leung, “Soft-QoS provisioning using the token bank fair queueing
     scheduling algorithm,” IEEE Wireless Communication Magazine, Jun. 2003.
[9] T. Karygiannis and L. Owens, “Wireless Network Security 802.11, Bluetooth and Handheld Devices,”
     chapter 2, http://csrc.nist.gov/publications/nistpubs/ 800-48/NIST SP 800-48.pdf.
[10] White paper of Cisco, “Building the mobile business with a unified wireless network
     http://epsfiles.intermec.com/eps files/eps wp/CISCO SecuringWirelessLAN wpweb.pdf.
[11] M. A Badamas, “Mobile computing systems–security considerations,” Information Management and
     Security 2001, pp. 134–136.
[12] V. Gupta and S. Gupta, “Securing the wireless Internet,” IEEE Commun. Mag., pp. 68–74, Dec. 2001.
[13] O. M. Karygiannis, Wireless Network Security, NIST special publication 800–48.
[14] K. Siau, E. P. Lim, and Z. Shen, “Mobile commerce: promises, challenges and research agenda,” J.
     Database Management, vol. 12, pp. 4–19, July–Sept. 2001.
[15] X. Qin and H. Jiang, “Dynamic, reliability-driven scheduling of parallel real-time jobs in
     heterogeneous systems,” in Proc. Int’l Conf. on Parallel Processing, pp. 113–122, 2001.
[16] X. Qin, H. Jiang, D. R. Swanson, “An efficient fault-tolerant scheduling algorithm for real-time tasks
     with precedence constraints in heterogeneous systems,” in Proc. Int’l Conf. on Parallel Processing,
     British Columbia, Canada, pp. 360–368, Aug. 2002.
[17] J. C. Palencia and H. M. Gonzalez, “Schedulability analysis for tasks with static and dynamic offsets,”
     in Proc. 19th IEEE Real-Time Systems Symp. 1998, pp. 26–37.
[18] T. F. Abdelzaher and K. G. Shin, “Combined task and message scheduling in distributed real-time
     systems,” IEEE Trans. Parallel and Distributed Syst., vol. 10, no. 11, Nov. 1999.
[19] M. A. Palis, “Online real-time job scheduling with rate of progress guarantees,” in Proc. 6th Int’l
     Symp. Parallel Architectures, Algorithms, and Networks 2002, pp. 65–70.
[20] G. Manimaran and C. S. R. Murthy, “An efficient dynamic scheduling algorithm for multimachine real-
     time systems,” IEEE Trans. Parallel and Distributed Syst., vol.9, no. 3, pp. 312–319, 1998.
[21] S. Al-Harthi and R. Rao, “A switch model for improving throughput and power fairness in Bluetooth
     piconets,” in Proc. Globecom 2003, pp.1279–1283.
[22] B. Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)”, Fast
     Software Encryption, Cambridge Security Workshop Proceedings (December 1993), Springer-Verlag,
     1994, pp. 191-204.
N. Paparayudu, is pursing M.Tech in Software Engineering Stream, in the branch of Computer Science, in
Aurora’s Engineering College, Bhongir, Andhra Pradesh, India. His areas of interest are Data Engineering,
Wireless Networks, and Information Security. Email: rayudu8_n@yahoo.co.in.
G.Suresh Kumar, has Masters in Technology and Computer Application , and he has been working as an
Associate Professor in Aurora’s Engineering College, Bhongir, Andhra Pradesh, India. His areas of interest
are Data Engineering, Wireless Networks, Information Security, and Cloud Computing. Email:
suresh.virgo18@gmail.com
Srikanth Jatla, working as Associate Professor and Head of the Department of Computer Science and
Engineering at Aurora’s Engineering College with a teaching experience of 12years.He is a B.E and M.


                                                    35
Network and Complex Systems                                                             www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
Tech in Computer Science and pursuing his PhD in Data Stream Mining at JNTU, Hyderabad. His areas of
interest includes data structures, principles of programming languages, algorithm analysis and compiler
design, Email: jsrikanth@aurora.ac.in




                                        Figure 1. Feistel Cipher




                              Fig 2. The Architecture of Network System




                                                  36
Network and Complex Systems                                  www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012




                                 Fig 3. The SPSS Algorithm




                                            37
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

More Related Content

What's hot

CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATIONCIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATIONijcsit
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509IJMER
 
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...IJCSIS Research Publications
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
 
Gateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksGateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksEricsson
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING IJNSA Journal
 
Evaluation the performanc of dmz
Evaluation the performanc of dmzEvaluation the performanc of dmz
Evaluation the performanc of dmzBaha Rababah
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...IOSR Journals
 
CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...
CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...
CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...ijcsit
 
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESA WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESijcsit
 
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANijtsrd
 
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSDATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSijasuc
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
 

What's hot (19)

CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATIONCIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
 
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...
 
Gateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksGateway Selection in Capillary Networks
Gateway Selection in Capillary Networks
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
 
Evaluation the performanc of dmz
Evaluation the performanc of dmzEvaluation the performanc of dmz
Evaluation the performanc of dmz
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
 
CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...
CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...
CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...
 
U0 vqmtq2o tk=
U0 vqmtq2o tk=U0 vqmtq2o tk=
U0 vqmtq2o tk=
 
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESA WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
 
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLAN
 
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSDATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
 

Viewers also liked

Security vulnerabilities for grown ups - GOTOcon 2012
Security vulnerabilities for grown ups - GOTOcon 2012Security vulnerabilities for grown ups - GOTOcon 2012
Security vulnerabilities for grown ups - GOTOcon 2012Vitaly Osipov
 
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)Jaap van Ekris
 
Healthcare IT Security - Who's responsible, really?
Healthcare IT Security - Who's responsible, really?Healthcare IT Security - Who's responsible, really?
Healthcare IT Security - Who's responsible, really?Redspin, Inc.
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 

Viewers also liked (6)

Security vulnerabilities for grown ups - GOTOcon 2012
Security vulnerabilities for grown ups - GOTOcon 2012Security vulnerabilities for grown ups - GOTOcon 2012
Security vulnerabilities for grown ups - GOTOcon 2012
 
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
 
Healthcare IT Security - Who's responsible, really?
Healthcare IT Security - Who's responsible, really?Healthcare IT Security - Who's responsible, really?
Healthcare IT Security - Who's responsible, really?
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 

Similar to 11.providing security to wireless packet networks by using optimized security method

An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Research Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor NetworksResearch Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor NetworksEswar Publications
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewIRJET Journal
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddvEditor Jacotech
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
 
A Brief Review on Wireless Networks
A Brief Review on Wireless NetworksA Brief Review on Wireless Networks
A Brief Review on Wireless NetworksIRJET Journal
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for floodingijcsa
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 

Similar to 11.providing security to wireless packet networks by using optimized security method (20)

An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Research Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor NetworksResearch Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor Networks
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
 
A Brief Review on Wireless Networks
A Brief Review on Wireless NetworksA Brief Review on Wireless Networks
A Brief Review on Wireless Networks
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for flooding
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 

More from Alexander Decker

A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 
A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...Alexander Decker
 
A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...Alexander Decker
 
A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...Alexander Decker
 

More from Alexander Decker (20)

A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 
A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...
 
A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...
 
A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

11.providing security to wireless packet networks by using optimized security method

  • 1. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 Providing Security to Wireless Packet Networks by using Optimized Security Method N. Paparayudu* G. Suresh Kumar J.Srikanth Aurora’s Engineering College, Raigir, Bhongir, Nalgonda Dist, Andhra Pradesh, India. * E-mail of the corresponding author: rayudu8_n@yahoo.co.in Abstract Now-a-days technology is growing very fast, due to rapid development of the technology in computer arena, communication through network become a habit to the users. Communication through network is happen using two channels i.e., by connection oriented and connection less. At present users prefer wireless networks for communication and transferring data due to its flexibility. So in this paper we are focusing on wireless networking, as it is not reliable we are proposing an optimized security technique to provide security to the communication on wireless. In this paper we mainly focus on packet scheduling which plays the vital role in the transmission of data over wireless networks. We are using optimized security technique to secure the packets at initial level itself while scheduling the packets. Keywords: Real-Time Packets, Packet Scheduling, Wireless Networks, Security, Cryptography, Secret key, Bandwidth. 1. Introduction The quirky thing about a wireless network is that you cannot always see what you are dealing with. In a wireless network, establishing connectivity is not a simple task like plugging in a cable, providing physical security is not easy by keeping unauthorized individuals out of a facility, and troubleshooting even trivial, issues can sometimes result in a few expletives being thrown in the general direction of an access point. [4] It should be noted that supporting efficient and reliable data transmission, especially real time data transmission, over wireless networks is extremely difficult and challenging because wireless networks must be facing more complicated environments compared with conventional wired networks. For instance, wireless networks could be disturbed by radio wave and thunderstorms or blocked by physical objects like mountains or skyscrapers. Even worse, high mobility coupled with a variety of explosively increased users makes existing security policies in wireless networks inefficient or even useless, meaning that wireless networks can be easily attacked by computer viruses, worms, spy wares, and similar threats. These security threats cause downtime or continual patching in wireless networks and thus lead to severe disruption in wireless commercial business. Therefore, boosting security of wireless networks has become one of the most important issues in the arena of wireless communications. [1] With the rapid growth of needs for wireless multimedia applications and wireless data services, it is expected that the future broadband wireless networks will support the transmission of heterogeneous classes of traffic (e.g., realtime and non-realtime traffic flows). The design of broadband wireless networks introduces a set of challenging technical issues. Among all these issues that need to be resolved, packet scheduling problem is one of the most important. It is well known that, the bandwidth resource of wireless networks is very scarce. Scheduling algorithms, which are in charge of the bandwidth allocation and multiplexing, have major influence on the network performance. [2] However, in packet cellular environments, user mobility and wireless channel error make it very difficult to perform either resource reservation or fair packet scheduling. While there have been some recent efforts to provide resource reservation for mobile flows in packet cellular networks, the problem of fair packet scheduling in wireless networks has remained largely unaddressed. In fact, even the notion of fairness in shared channel wireless networks has not been precisely defined. [3] At the packet level wireless networks are similar to wired networks in most ways. Wireless networks still use TCP/IP for data communication and abide by all of the same laws of networking as wired hosts. The major difference between the two networking platforms is found at the lower layers of the OSI model. 30
  • 2. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 Wireless networks communicate by sending data over the air as opposed to sending data across a wire. The air that wireless data is communicated on is a shared medium, and because of that special consideration must be given at the physical and data link layers to ensure that there are no data collisions and that data can be delivered reliably. These services are provided by different mechanisms of the 802.11 standard. [4] The primary difference between wireless and wired packets is the addition of the 802.11 header. This is a layer two header that contains extra information about the packet and the medium it is transmitted on. There are three types of 802.11 packets; data, management, and control. Management - These packets are used to establish connectivity between hosts at layer two. Some important subtypes of management packets include authentication, association, and beacon packets. Control - Control packets allow for delivery of management and data packets and are concerned with congestion management. Common subtypes include Request-to-Send and Clear-to-Send packets. Data - These packets contain actual data and are the only packet type that can be forwarded from the wireless network to the wired network. [4] In this paper we are proposing a blow fish security technique to encrypt the data packets at the time of packet scheduling is done, due to this decryption of the packet will not be possible by the attacker on the packet even though the packets are delay. That being said, securing wireless networks will continue to be a challenge for the foreseeable future. 2. Related Work In the literature, there are many schemes and protocols devoted to deal with the problem of packet scheduling. We broadly classify existing scheduling algorithms into three categories. A brief introduction of them follows. 2 2.1. Algorithms in wire line environment: Algorithms of first come- first-served (FCFS) and round robin (RR) are first developed for wire line networks. Their original versions and improved versions (e.g., Weighted Round Robin and Deficit Round Robin) are underlying schemes for wireless networks because of the simplicity and ease of implementation. Their drawback lies in the lack of consideration on the issues of bandwidth utilization and fairness guarantee. 3 2.2. Algorithms in wireless environment with GE-model: The classical two-state Gilbert-Eilliot (GE) model is firstly used to model the wireless link variation. The channel is simply described to be either in “good” or “bad” state in this model. A survey of this class of scheduling algorithms can be found in [5]. Work in [6] devised Idealized Weight Fair Queuing (IWFQ) algorithm. In [7], Channel-condition Independent Fair Queuing (CIF-Q) algorithm was put forward. Both algorithms of IWFQ and CIF-Q need to simulate a virtual error-free fair queuing system, and try to schedule packets in the same order as the ideal reference system does. IWFQ and CIF-Q differ in the way they compensate the lagging flows. Authors of [8] presented Token Bank Fair Queuing (TBFQ) algorithm, which uses token pools and token bank to keep track of the service status of each flow, and dynamically regulate the flows’ priorities to occupy the channel resource. All these three algorithms achieve good performance tradeoff among the three performance issues aforementioned. But they only work under the GE channel model, which is too coarse to characterize the fluctuation of wireless channel condition. Since security concern plays a vital role in the design and development of wireless mobile commercial applications, international wireless organizations, wireless equipment providers and academic researchers made extreme efforts in maximizing the features of existing security mechanisms and finding innovative security policies of wireless networks. IEEE improved the security character of 802.11 by designing 802.1X and 802.11i for WLAN [9]. 802.1X, a port-level access control protocol, provides a security framework for IEEE networks, including Ethernet and wireless networks. The 802.11i standard, also still in draft, was created for wireless-specific security functions that operate with IEEE 802.1X. Cisco provides the solutions for wireless applications by using strong encryption technology and providing unified WLAN [10]. Papers addressing the security problems also provide valuable solutions for wireless business applications [11] [12] [13] [14]. However, most of the efforts were made at the levels of protocols or systems; most existing approaches were focused on non-real time wireless applications. Packet scheduling plays an important role in achieving 31
  • 3. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 high performance in real-time wireless networks. A real time scheduler needs to guarantee both security and real-time constraints of packets even in the presence of hardware and software faults [15] [16]. Real time scheduling algorithms can be classified into static [17] [28] and dynamic [19] [20] strategies. 3. Methodology 4 3.1 Problem Definition According to Xiao Qin, Mohamed Alghamdi, Mais Nijim, Ziliang Zong, Kiranmai Bellam, Xiaojun Ruan, and Adam Manzanares et al, they are concentrating on the delay time of the packet delivery based on time scheduling; they are providing security at the time administrator identifies the delay of packet. The motto of this paper is to provide the security at the initial level while the packet is scheduled so that the attacker cannot do any kind of modification to the packet even though they trace the packet here we are concentrating on the security of the packet. In this paper we are discussing how to secure the packet from the attackers instead of depending on the delay time of the packet and think that the packet is damaged, in the proposed system the duty of the admission controller is to check with the packet and its structure if it is in the correct format the admission controller pushes the packet. 5 3.2 Solution As per the discussions, we are providing security to the packets while the packet is scheduling using BlowFish algorithm. 6 3.2.1 BlowFish Blowfish is a variable-length key block cipher. It does not meet all the requirements for a new cryptographic standard discussed above: it is only suitable for applications where the key does not change often, like a communications link or an automatic file encryptor. It is significantly faster than DES when implemented on 32-bit microprocessors with large data caches, such as the Pentium and the PowerPC. [22] a) Algorithm Blowfish is a variable-length key, 64-bit block cipher. The algorithm consists of two parts: a key-expansion part and a data- encryption part. Key expansion converts a key of at most 448 bits into several sub key arrays totaling 4168 bytes. Data encryption occurs via a 16-round Feistel network. Each round consists of a key-dependent permutation, and a key- and data-dependent substitution. All operations are XORs and additions on 32-bit words. The only additional operations are four indexed array data lookups per round.[22] Sub keys: Blowfish uses a large number of sub keys. These keys must be pre-computed before any data encryption or decryption. 1. The P-array consists of 18 32-bit sub keys: P1, P2,..., P18. 2. There are four 32-bit S-boxes with 256 entries each: S1,0, S1,1,..., S1,255; S2,0, S2,1,..,, S2,255; S3,0, S3,1,..., S3,255; S4,0, S4,1,..,, S4,255. The exact method used to calculate these sub keys will be described later. Encryption: Blowfish is a Feistel network consisting of 16 rounds (see Figure 1). The input is a 64-bit data element, x. Divide x into two 32-bit halves: xL, xR For i = 1 to 16: xL = xL XOR Pi xR = F(xL) XOR xR Swap xL and xR Next i Swap xL and xR (Undo the last swap.) xR = xR XOR P17 32
  • 4. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 xL = xL XOR P18 Recombine xL and xR Function F (see Figure 2): Divide xL into four eight-bit quarters: a, b, c, and d F(xL) = ((S1,a + S2,b mod 232) XOR S3,c) + S4,d mod 232 Decryption is exactly the same as encryption, except that P1, P2,..., P18 are used in the reverse order. Implementations of Blowfish that require the fastest speeds should unroll the loop and ensure that all sub keys are stored in cache. Generating the Subkeys: The sub keys are calculated using the Blowfish algorithm. The exact method is as follows: 1. Initialize first the P-array and then the four S-boxes, in order, with a fixed string. This string consists of the hexadecimal digits of pi (less the initial 3). For example: • P1 = 0x243f6a88 • P2 = 0x85a308d3 • P3 = 0x13198a2e • P4 = 0x03707344 2. XOR P1 with the first 32 bits of the key, XOR P2 with the second 32-bits of the key, and so on for all bits of the key (possibly up to P14). Repeatedly cycle through the key bits until the entire P- array has been XORed with key bits. (For every short key, there is at least one equivalent longer key; for example, if A is a 64-bit key, then AA, AAA, etc., are equivalent keys.) 3. Encrypt the all-zero string with the Blowfish algorithm, using the subkeys described in steps (1) and (2). 4. Replace P1 and P2 with the output of step (3). 5. Encrypt the output of step (3) using the Blowfish algorithm with the modified subkeys. 6. Replace P3 and P4 with the output of step (5). 7. Continue the process, replacing all entries of the P- array, and then all four S-boxes in order, with the output of the continuously-changing Blowfish algorithm. [22] In total, 521 iterations are required to generate all required sub keys. Applications can store the sub keys rather than execute this derivation process multiple times. b) The system model and assumptions In recent studies, a system model is proposed for wireless channel as an NN switch. Although each wireless node may have a single transmitter and a single receiver, it is common that the transmitter and receiver are combined in a transceiver. As such, a node cannot transmit and receive packages simultaneously. In our switch model, there exists a packet scheduler matching transmitters to corresponding receivers. The detailed information regarding the switch model can be found in [21]. In addition to the switch, other three key components in the system include a Security Level Controller (SLC), an Admission Controller (AC), and an EDF (Earliest Deadline First) scheduler as depicted in Fig. 1. This architecture is designed for a link between two nodes in a wireless network. All packets are submitted independently to the wireless link with arrival rates abided by Poisson distribution. The function of the Admission Controller is to determine whether incoming packets can be accepted or not. The Security Level Controller aims at increasing security levels of real-time packets residing in the Accepted queue that can be finished before their deadlines. The EDF scheduler makes use of the Earliest Deadline First policy to schedule admitted packets in which security levels are maximized by the Security Level Controller. c) The packet model Our packet model assumes that all packets have soft deadline and each packet is independent of one another. We also assume that packets’ arrival times follow the classical Poisson distribution. Packet Pi is represented as a tuple (ATi, PTi, SLi, Di), where ATi and PTi denote the arrival time and the processing time of packet i. SLi and Di represent the security level and soft deadline of packet i. Besides, without loss of generality we assume that each packet is assigned a quality of security measured as a security level SLi that in the range [1, 2,….., 10], where 1 and 10 are the lowest and highest levels of security. For example, if packet i has a value of 1 as a security level, this means that the packet has the lowest security level. Although wireless network devices are unable to determine security levels, packets’ security levels can be straightforwardly derived from the security requirements of applications. [1] 33
  • 5. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 To calculate the security overhead without loss of generality, we make use of formula (1) to model the security overhead envisioned as the extra processing time experienced by packet i. SOi = ETi * (SLi/R) (1) where SOi is the security overhead of packet i, SLi is the security level provided to packet i, ETi is the transmission time of the packet. And R is set to 10. Thus, the total processing time WLi of packet i can be expressed as: WLi = ETi + SOi = ETi * (1 + SLi/R) (2) d) The SPSS Algorithm The main goal of this study is to maximize the overall system performance, which reflects the guarantee ratio and security level. To achieve this goal, we designed the SPSS scheduling algorithm with security awareness. SPSS aims to maintain high guarantee ratios while maximizing the security levels. We can accomplish high performance and high security level by applying the Security Level Controller to our SPSS algorithm. Fig. 2 below outlines the flow chart of the security-aware packet-scheduling algorithm (SPSS) for wireless links. The SPSS algorithm strives to maximize the security level of a packet residing in the accepted queue while making the best effort to guarantee its deadline. If the deadline of the packet can be met, the packet will be admitted in the accepted queue. Otherwise, the packet will be dropped and placed in the rejected queue. The following constraint shows whether the packet is equipped to meet its deadline. CTi − STi <= di where STi is the start time of transmission of the ith packet, CTi is the completion time of the transmission, and di is the packet’s deadline. The packets stored in the accepted queue are scheduled depending on their specified deadlines, meaning that the packets with earlier deadlines will be processed first. The SPSS algorithm initializes the security levels of all packets to the minimum levels. Then, SPSS gradually enhances the security level of each packet Pi under the condition that (1) the current packet Pi can be transmitted before its deadline; and (2) the deadlines of the packets being processed later than Pi also can be guaranteed. The above criterion is important and reasonable because if a packet is admitted to the real-time wireless link, then the packet’s timing constraint has to be guaranteed. In other words, the SPSS algorithm ensures that an admitted packet is not adversely affected by subsequently admitted packets. [1] The following steps delineate the procedure of the SPSS scheduling. Step 1: initialize the scheduler; the security values of incoming packets; and the number of rejected packets is set to zero. Wait for any incoming packets. Step 2: if a packet I arrives and it is the only packet available, process the packet immediately using its highest security level. The starting time (STi) and the completion time (CTi) of the packet are calculated. Step 3: All the packets arriving in the scheduler during the time period [STi, CTi] are temporarily stored into a waiting queue in the non-decreasing order of their deadlines. The starting time of the next packet STi + 1 is set to CTi. Step 4: the admission controller is responsible for deciding whether a packet in the waiting queue can be accepted by considering the deadline of this packet. If the packet’s deadline and security requirement can both be guaranteed, the packet will be forwarded into the accepted queue (step 3 and step5). Otherwise, being put into the rejected queue will drop the packet; the number of rejected packets is increased by one. Step 5: the security level controller raises the security levels of all the packets residing in the accepted queue as high as possible. The enhancements of the security levels for real-time packets residing in the accepted queue are subject to the following two constraints: (1) Increasing of an accepted packet’s security level should still guarantee the deadline of the packet. (2) The increase of security levels must not lead to any rejection of currently accepted packet. Step 6: At this point, the security level SLi+1 of the next starting packet is maximized. The packet’s completion time CTi+1 is calculated. Steps 3-6 are repeatedly executed until all the arriving packets are processed in one run. [1] 5. Conclusion Providing security at the time of packet scheduling will help the admission controller to push the packets instead of wasting time by rejecting the packet and providing the level of security to the packet based on the rejection. That being said, securing wireless networks will continue to be a challenge for the foreseeable future. 34
  • 6. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 References [1] Xiao Qin, Mohamed Alghamdi, Mais Nijim, Ziliang Zong, Kiranmai Bellam, Xiaojun Ruan, and Adam Manzanares, “Improving Security of Real-Time Wireless Networks Through Packet Scheduling”, IEEE Transaction on Wireless Communications, Vol. 7, No. 9, September 2008, Page No: 3273-3279. [2] Rong Yu, Zhi Sun, and Shunliang Mei , “Packet Scheduling in Broadband Wireless Networks Using Neuro-Dynamic Programming”, 1550-2252/$25.00 ©2007 IEEE, page No: 2776-2780. [3] Songwu Lu, Vaduvur Bharghavan, R. Srikant, “Fair Scheduling in Wireless Packet Networks”, IEEE/ACM Transactions on Networking, Vol. 7, No. 4, August 1999. Page No: 473-489. [4] Chris Sanders, "Analyzing Wireless Network Security at the packet Level", Articles Misc Network Security, published on Aug 11, 2010. [5] Y. Cao and V. O. K. Li, “Scheduling algorithm in broad-band wireless networks,” in Proc. of the IEEE vol. 89, no. 1, pp. 76-87, Jan. 200l. [6] S. Lu and V. Bharghavan, “Fair scheduling in wireless packet networks,” IEEE/ACM Trans. Networking, vol. 7, no. 4, pp. 473-489, 1999. [7] T. S. Eugene Ng, I. Stoica, and H. Zhang, “Packet fair queueing algorithms for wireless networks with location-dependent errors,” in Proc. INFOCOM98, pp. 1103-1111, Mar. 1998. [8] W. K. Wong, J. Zhu, and V. C. M. Leung, “Soft-QoS provisioning using the token bank fair queueing scheduling algorithm,” IEEE Wireless Communication Magazine, Jun. 2003. [9] T. Karygiannis and L. Owens, “Wireless Network Security 802.11, Bluetooth and Handheld Devices,” chapter 2, http://csrc.nist.gov/publications/nistpubs/ 800-48/NIST SP 800-48.pdf. [10] White paper of Cisco, “Building the mobile business with a unified wireless network http://epsfiles.intermec.com/eps files/eps wp/CISCO SecuringWirelessLAN wpweb.pdf. [11] M. A Badamas, “Mobile computing systems–security considerations,” Information Management and Security 2001, pp. 134–136. [12] V. Gupta and S. Gupta, “Securing the wireless Internet,” IEEE Commun. Mag., pp. 68–74, Dec. 2001. [13] O. M. Karygiannis, Wireless Network Security, NIST special publication 800–48. [14] K. Siau, E. P. Lim, and Z. Shen, “Mobile commerce: promises, challenges and research agenda,” J. Database Management, vol. 12, pp. 4–19, July–Sept. 2001. [15] X. Qin and H. Jiang, “Dynamic, reliability-driven scheduling of parallel real-time jobs in heterogeneous systems,” in Proc. Int’l Conf. on Parallel Processing, pp. 113–122, 2001. [16] X. Qin, H. Jiang, D. R. Swanson, “An efficient fault-tolerant scheduling algorithm for real-time tasks with precedence constraints in heterogeneous systems,” in Proc. Int’l Conf. on Parallel Processing, British Columbia, Canada, pp. 360–368, Aug. 2002. [17] J. C. Palencia and H. M. Gonzalez, “Schedulability analysis for tasks with static and dynamic offsets,” in Proc. 19th IEEE Real-Time Systems Symp. 1998, pp. 26–37. [18] T. F. Abdelzaher and K. G. Shin, “Combined task and message scheduling in distributed real-time systems,” IEEE Trans. Parallel and Distributed Syst., vol. 10, no. 11, Nov. 1999. [19] M. A. Palis, “Online real-time job scheduling with rate of progress guarantees,” in Proc. 6th Int’l Symp. Parallel Architectures, Algorithms, and Networks 2002, pp. 65–70. [20] G. Manimaran and C. S. R. Murthy, “An efficient dynamic scheduling algorithm for multimachine real- time systems,” IEEE Trans. Parallel and Distributed Syst., vol.9, no. 3, pp. 312–319, 1998. [21] S. Al-Harthi and R. Rao, “A switch model for improving throughput and power fairness in Bluetooth piconets,” in Proc. Globecom 2003, pp.1279–1283. [22] B. Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)”, Fast Software Encryption, Cambridge Security Workshop Proceedings (December 1993), Springer-Verlag, 1994, pp. 191-204. N. Paparayudu, is pursing M.Tech in Software Engineering Stream, in the branch of Computer Science, in Aurora’s Engineering College, Bhongir, Andhra Pradesh, India. His areas of interest are Data Engineering, Wireless Networks, and Information Security. Email: rayudu8_n@yahoo.co.in. G.Suresh Kumar, has Masters in Technology and Computer Application , and he has been working as an Associate Professor in Aurora’s Engineering College, Bhongir, Andhra Pradesh, India. His areas of interest are Data Engineering, Wireless Networks, Information Security, and Cloud Computing. Email: suresh.virgo18@gmail.com Srikanth Jatla, working as Associate Professor and Head of the Department of Computer Science and Engineering at Aurora’s Engineering College with a teaching experience of 12years.He is a B.E and M. 35
  • 7. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 Tech in Computer Science and pursuing his PhD in Data Stream Mining at JNTU, Hyderabad. His areas of interest includes data structures, principles of programming languages, algorithm analysis and compiler design, Email: jsrikanth@aurora.ac.in Figure 1. Feistel Cipher Fig 2. The Architecture of Network System 36
  • 8. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 Fig 3. The SPSS Algorithm 37
  • 9. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Chemistry and Materials Research CMR@iiste.org Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Civil and Environmental Research CER@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Food Science and Quality Management FSQM@iiste.org Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing: New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar. Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).