Open Access Open Access  Restricted Access Subscription or Fee Access

A Secure Packet Handover Scheme using RSA Algorithm in Wireless Networks

Rajwinder Kaur, Sandeep Singh Kang

Abstract


Standards of IEEE 802 ease the deployment of networking infrastructures and provides employers to access corporate networks while travelling or visiting. These standards provide two modes of communication called infrastructure and ad hoc modes. At present Wireless network has been deployed worldwide, but some security issues in wireless network might have prevented its further acceptance. IEEE 802.1X specification is one of the solutions to overcome the limitation of wireless network security, a technique for port-based network handover control, which is based on Rivest, Shamir and Adleman(RAS). It is an authentication framework that can support public-key cryptography. RAS algorithm involves three steps: key generation, password based encryption, decryption between base stations and it is flexible in its implementation. Thus, it might be possible to use RSA as a generic authentication mechanism in various wireless networks including ad hoc network. This paper describes Wireless network scenario we must have improve Performance, Security, Usability in wireless network on base stations using proposed algorithm with RSA cryptography based algorithm.

Keywords


IEEE 802.11, Simulation, Wireless, Network Performance and Security, EAP, RSA.

Full Text:

PDF

References


Levente Buttyana, Laszlo Dora, Fabio Martinelli, Marinella Petrocchi (2010) “Fast Certificate-based Authentication Scheme in Multi-operator maintained Wireless Mesh Networks”.

C. Rigney, A. Rubens, W. Simpson, and S. Willens(2000), Remote authentication dial in user service (RADIUS),RFC 2865.

Emmanuel Bresson (2007) “A security solution for IEEE 802.11s ad hoc mode: password-authentication and group Diffie–Hellman key exchange”.

Yalin Chen1, Jue-Sam Chou , Chun-Hui Huang “Improvements on two password-based authentication protocols”.

David P. Jablon Integrity Sciences, Inc. In (1996) “Strong Password-Only Authenticated Key Exchange”.

Michel Abdalla and David Pointcheval “Interactive Diffe-Hellman Assumptions With Applications to Password-Based Authentication”.

Art Conklin, Glenn Dietrich, Diane Walz (2004) “Password-Based Authentication: A System Perspective”.

Yair Amir, Claudiu Danilov, Michael Hilsdale, Raluca Mus_aloiuElefteri,

Nilo Rivera “Fast Handoff for Seamless Wireless Mesh Networks”.

Dr. A. K. Verma, (2009),”Secure routing in Wireless sensor networks”.

Dragorad Milovanovic, Zoran Bojkovic, (2010) “On performance of TCP and VoIP traffic in mobile WiMAX networks”, Issue 5, Volume 9.

Maneesh Bakshi,(2010) “VoIP / Multimedia over WiMAX (802.16), 9.

IEEE Xplore (2007), “Security Challenge and Defense in VoIP Infrastructures by D Butcher”.

S.C. Wang, H.H. Liang and K.Q. Yan,(2009), “Capability Based Clustering Mechanism in WiMAX”, Proceedings of the International MultiConference of Engineers and Computer Scientists, Vol I IMECS.

Harshal A. Arolkar, (1997), “ Ant Colony based Approach for Intrusion Detection on Cluster Heads in WSN”

Lin SHEN and Xiangquan SHI,(2008), ” A Dynamic Cluster-based Key Management Protocol in Wireless Sensor Networks”, International Journal Of Intelligent Control And Systems, Vol. 13, No. 2, 146-151

Tim Daniel Hollerung, (2004),” The Cluster-Based Routing Protocol”, project group „Mobile Ad-Hoc Networks Based on Wireless LAN‟.

Suraj Kumar Sharma, Sanjay Kumar Jena,(2010), ” SCMRP: Secure Cluster Based Multipath Routing Protocol for Wireless Sensor Networks”, 978-1-4244-9730-0/10/$26.00 © IEEE


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.