Enhancing the Security Levels in WLAN via Novel IBSPS
Need of wireless technology increasing day to day due to the rapid development in information and communications technology. Threats and attacks are also growing in accordance with the increment in the usage of wireless communication technology. Especially Wireless Local Area Networks (WLAN) are less sensitive to the security attacks. This work combines the image processing and speech processing techniques. This work introduces Improved Bio-cryptic security aware packet scheduling (IBSPS) algorithm to enhance security levels in WLAN. To strengthen the authentication mechanism this work replaces the existing Enhanced Bio-cryptic security packet scheduling algorithm (EBSPS) with the IBSPS algorithm. In addition biometric encryption of features like finger print, Iris, Palm print and Face. IBSPS adds one more bio-cryptic security in the form of human voice as security level. Simulation were made on Matlab software and results prove that the proposed IBSPS security is stronger than the existing EBSPS and Bio-cryptic security aware packet scheduling (BSPS).
KeywordsBio-cryptography Wireless LAN Bio-cryptic security aware packet scheduling Enhanced Bio-cryptic security aware packet scheduling security in WLAN
Unable to display preview. Download preview PDF.
- 3.Lapiotis, G., Kim, B., Das, S., Anjum, F.: A policy-based approach to wireless LAN security management. In: Proceedings of 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, pp. 181–189 (2005)Google Scholar
- 4.Ali, H.B., Karim, M.R., Ashraf, M., Powers, D.M.W.: Modeling and verification of Extensible Authentication Protocol for Transport layer Security in Wireless LAN environment. In: Proceedings of Second International Conference on Software Technology and Engineering, pp. 41–45 (2010)Google Scholar
- 6.Xi, K., Hu, J.: Bio-Cryptography. In: Handbook of Information and Communication Security, pp. 129–157 (2010)Google Scholar
- 7.Scheffer, N., Ferrer, L., Lawson, A., Lei, Y.: Recent developments in voice biometrics: Robustness and high accuracy. In: Proceedings of IEEE International Conference on Technologies for Homeland Security (HST), pp. 447–452 (2013)Google Scholar
- 9.Duvvuru, R., Singh, S.K., Rao, G.N., Kote, A., Krishna, B.B., Raju, M.V.: Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA. In: Singh, K., Awasthi, A.K. (eds.) QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 115, pp. 185–196. Springer, Heidelberg (2013)CrossRefGoogle Scholar
- 10.Duvvuru, R., Rao, P.J., Singh, S.K.: Improvizing Security levels in WLAN via Novel BSPS. In: Proceedings of IEEE International Conference on Emerging Trends in Communication, Control, Signal Processing and Computer Applications (2013)Google Scholar
- 12.Ramesh, A., Setty, S.P.: Analysis on biometric encryption using RSA algorithm. International Journal Multidisciplinary Educational and Research 1(3), 302–307 (2013)Google Scholar
- 13.Adams, R.H., Calif, S.V.: Voice Encryption System. US Patient No. 4,232,194 (1980)Google Scholar
- 14.Chumchu, P., Phayak, A., Dokpikul, P.: A simple and cheap end-to-end voice encryption framework over GSM-based networks. In: Proceedings of IEEE International Conference on Computing, Communications and Applications Conference, pp. 210–214 (2012)Google Scholar
- 15.Sankaran, V.M., Singh, R.: Hierarchical Fusion for Matching Simultaneous Latent Fingerprint. In: Proceedings of International Conference on Biometrics: Theory, Applications and Systems (2012)Google Scholar
- 17.Kumar, A., Shekhar, S.: Personal Identification using Rank-level Fusion. IEEE Trans. Systems, Man, and Cybernetics: Part C41(5), 743–752 (2011)Google Scholar
- 18.Jain, V., Mukherjee, A.: The Indian Face Database (2002)Google Scholar