Abstract
Security and ease of use are two fundamental requirements of wireless network users. But they conflict with each other. The strongly secure network will put a lot of load on the server for security related work which may hamper the packet delivery ratio. But strong security is indispensable for maintaining the confidentiality of information in current real-time wireless communication networks. This research work combines both, the concepts of network security and the packet scheduling issues of the wireless data packets. Most of the users using wireless network are unaware about what level of security is needed for them. We present a new Automated Security-Aware Packet Scheduling Strategy or ASPS for real-time wireless network. This ASPS algorithm assigns the desirable level of security automatically to the respective data packets with guarantee of deadlines for the packets. Our simulation result proves that our proposal is performing better than existing algorithms in terms of the quality of security, guarantee ratio and reducing the load on the network switch.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
http://www.deloitte.com/assets/DcomIndia/Local%20Assets/Documents/All%20India%20Wifi%20Survey.pdf
Nagarajan, V., Arsaan, V., Huang, D.: Using Power Hopping to Counter MAC Spoof Attacks in WLAN. In: Conference on Consumer Communications and Networking Conference, pp. 1–5 (2010)
Eberz, S., Strohmeier, M., Wilhelm, M., Martinovic, I.: A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 235–252. Springer, Heidelberg (2012)
Huang, H., Ahmed, N., Karthik, P.: On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network. IEEE Transactions On Wireless Communications, 2316–2324 (2011)
Park, J.C., Kasera, S.K.: Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls. In: IEEE Wireless Communications and Networking Conference, Salt Lake City, pp. 1525–3511 (2007)
Lashkari, H., Mohammad, M., Danesh, S.: A Survey on Wireless Security protocols (WEP, WPA and WPA2/802.11i). In: Second IEEE International Conference on Computer Science and Information Technolog 2009, Kuala Lumpur, Malaysia, pp. 48–52 (2009)
m [7] Xiao Qin, Mohamed Alghamdi, Mais Nijim, Ziliang Zong, Kiranmai Bellam, Xiaojun Ruan,and Adam Manzanares. : Improving Security of Real-Time Wireless Networks through Packet Scheduling. In: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 2008, IEEE Communications Society, pp. 3273- 3279, (2011).
Moh’d, A., Jararweh, Y., Tawalbeh, L.: AES-512: 512-Bit Advanced Encryption StandardAlgorithm Design and Evaluation. In: 7th International Conference on Information Assurance and Security, pp. 292–297. Halifax, NS (2011)
Han, S.-J., Oh, H.-S., Park, J.: The improved Data Encryption Standard (DES) Algorithm. In: IEEE 4th International Conference on Spread Spectrum Techniques and Applications Proceedings, Jongan Park, pp. 1310–1314 (1996)
Dua, A., Bambos, N.: On The Fairness Delay Trade-off in Wireless Packet Scheduling. In: IEEE Proceedings of the Global Telecommunications Conference, Palo Alto, pp. 25–48 (2005)
Alanazi, H.O., Zaidan, B.B., Zaidan, A.A., Jalab, H.A., Shabbir, M., Al-Nabhani, Y.: New Comparative Study Between DES, 3DES and AESwithin Nine Factors. Journal of Computing, 152–157 (2010)
http://www.rsa.com/rsasecured/guides/imp_pdfs/Cisco_VPN3K_47_AuthMan7.1.pdf
Mattihalli, C.: Designing and Implementing of Earliest Deadline First scheduling algorithm on Standard Linux. In: 2010 IEEE/ACM Int’l Conference on & Int’l Conference on Cyber, Physical and Social Computing, Green Computing and Communications (GreenCom), Hangzhou, China, pp. 901–906 (2010)
Bruno, R., Conti, M., Gregori, E.: Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows. IEEE Transactions On Mobile Computing, 171–186 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Duvvuru, R., Singh, S.K., Rao, G.N., Kote, A., Krishna, B.B., Raju, M.V. (2013). Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-37949-9_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37948-2
Online ISBN: 978-3-642-37949-9
eBook Packages: Computer ScienceComputer Science (R0)