Skip to main content

Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA

  • Conference paper
Quality, Reliability, Security and Robustness in Heterogeneous Networks (QShine 2013)

Abstract

Security and ease of use are two fundamental requirements of wireless network users. But they conflict with each other. The strongly secure network will put a lot of load on the server for security related work which may hamper the packet delivery ratio. But strong security is indispensable for maintaining the confidentiality of information in current real-time wireless communication networks. This research work combines both, the concepts of network security and the packet scheduling issues of the wireless data packets. Most of the users using wireless network are unaware about what level of security is needed for them. We present a new Automated Security-Aware Packet Scheduling Strategy or ASPS for real-time wireless network. This ASPS algorithm assigns the desirable level of security automatically to the respective data packets with guarantee of deadlines for the packets. Our simulation result proves that our proposal is performing better than existing algorithms in terms of the quality of security, guarantee ratio and reducing the load on the network switch.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.deloitte.com/assets/DcomIndia/Local%20Assets/Documents/All%20India%20Wifi%20Survey.pdf

  2. Nagarajan, V., Arsaan, V., Huang, D.: Using Power Hopping to Counter MAC Spoof Attacks in WLAN. In: Conference on Consumer Communications and Networking Conference, pp. 1–5 (2010)

    Google Scholar 

  3. Eberz, S., Strohmeier, M., Wilhelm, M., Martinovic, I.: A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 235–252. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  4. Huang, H., Ahmed, N., Karthik, P.: On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network. IEEE Transactions On Wireless Communications, 2316–2324 (2011)

    Google Scholar 

  5. Park, J.C., Kasera, S.K.: Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls. In: IEEE Wireless Communications and Networking Conference, Salt Lake City, pp. 1525–3511 (2007)

    Google Scholar 

  6. Lashkari, H., Mohammad, M., Danesh, S.: A Survey on Wireless Security protocols (WEP, WPA and WPA2/802.11i). In: Second IEEE International Conference on Computer Science and Information Technolog 2009, Kuala Lumpur, Malaysia, pp. 48–52 (2009)

    Google Scholar 

  7. m [7] Xiao Qin, Mohamed Alghamdi, Mais Nijim, Ziliang Zong, Kiranmai Bellam, Xiaojun Ruan,and Adam Manzanares. : Improving Security of Real-Time Wireless Networks through Packet Scheduling. In: IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 2008, IEEE Communications Society, pp. 3273- 3279, (2011).

    Google Scholar 

  8. Moh’d, A., Jararweh, Y., Tawalbeh, L.: AES-512: 512-Bit Advanced Encryption StandardAlgorithm Design and Evaluation. In: 7th International Conference on Information Assurance and Security, pp. 292–297. Halifax, NS (2011)

    Google Scholar 

  9. Han, S.-J., Oh, H.-S., Park, J.: The improved Data Encryption Standard (DES) Algorithm. In: IEEE 4th International Conference on Spread Spectrum Techniques and Applications Proceedings, Jongan Park, pp. 1310–1314 (1996)

    Google Scholar 

  10. Dua, A., Bambos, N.: On The Fairness Delay Trade-off in Wireless Packet Scheduling. In: IEEE Proceedings of the Global Telecommunications Conference, Palo Alto, pp. 25–48 (2005)

    Google Scholar 

  11. Alanazi, H.O., Zaidan, B.B., Zaidan, A.A., Jalab, H.A., Shabbir, M., Al-Nabhani, Y.: New Comparative Study Between DES, 3DES and AESwithin Nine Factors. Journal of Computing, 152–157 (2010)

    Google Scholar 

  12. http://www.rsa.com/rsasecured/guides/imp_pdfs/Cisco_VPN3K_47_AuthMan7.1.pdf

  13. Mattihalli, C.: Designing and Implementing of Earliest Deadline First scheduling algorithm on Standard Linux. In: 2010 IEEE/ACM Int’l Conference on & Int’l Conference on Cyber, Physical and Social Computing, Green Computing and Communications (GreenCom), Hangzhou, China, pp. 901–906 (2010)

    Google Scholar 

  14. Bruno, R., Conti, M., Gregori, E.: Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows. IEEE Transactions On Mobile Computing, 171–186 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Duvvuru, R., Singh, S.K., Rao, G.N., Kote, A., Krishna, B.B., Raju, M.V. (2013). Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37949-9_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37948-2

  • Online ISBN: 978-3-642-37949-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics