Open Access   Article Go Back

Improvement in Security Architecture for Hybrid Networks in Wireless and Wired Devices for End to End Security

Kamini 1 , Rajiv Mahajan2 , Ravinder Singh3

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 167-173, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.167173

Online published on Apr 30, 2019

Copyright © Kamini, Rajiv Mahajan, Ravinder Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kamini, Rajiv Mahajan, Ravinder Singh, “Improvement in Security Architecture for Hybrid Networks in Wireless and Wired Devices for End to End Security,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.167-173, 2019.

MLA Style Citation: Kamini, Rajiv Mahajan, Ravinder Singh "Improvement in Security Architecture for Hybrid Networks in Wireless and Wired Devices for End to End Security." International Journal of Computer Sciences and Engineering 7.4 (2019): 167-173.

APA Style Citation: Kamini, Rajiv Mahajan, Ravinder Singh, (2019). Improvement in Security Architecture for Hybrid Networks in Wireless and Wired Devices for End to End Security. International Journal of Computer Sciences and Engineering, 7(4), 167-173.

BibTex Style Citation:
@article{Mahajan_2019,
author = {Kamini, Rajiv Mahajan, Ravinder Singh},
title = {Improvement in Security Architecture for Hybrid Networks in Wireless and Wired Devices for End to End Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {167-173},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4012},
doi = {https://doi.org/10.26438/ijcse/v7i4.167173}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.167173}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4012
TI - Improvement in Security Architecture for Hybrid Networks in Wireless and Wired Devices for End to End Security
T2 - International Journal of Computer Sciences and Engineering
AU - Kamini, Rajiv Mahajan, Ravinder Singh
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 167-173
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
594 370 downloads 191 downloads
  
  
           

Abstract

Security for wireless devices is turning into vital day by day. When internet connection is available for mobile devices all the communication pass through some intermediates. The end to end security is the major issues in wireless security contrivances like mobile phone and PDA(Personal Digital Assistant).When mobile contrivance wants to communicate to the web server through internet the all the communication pass through the Wireless Application Protocol gateway. This Wireless Application gateway protocols interprets all the convention utilized in Wireless Application gateway to the protocols utilized in the cyber world. The Wireless Application Protocol proxy server use encoding and decoding technique for the content to reduce the size of the data that has been sent through the wireless link. The communication between the mobile phones and wireless application protocol is secured by utilizing the safety protocol is termed Wireless Transport layer security. The communication between the WAP entrance and net server is secured through the TLS/SSL security protocols. This paper presents an evaluation study of wireless and wired network utilizing OPNET simulation implement. This paper simulated 2 different scenarios comparing wireless mobile client communication utilizing Wireless Transport Layer Security gateway with MD5_RSA encryption and Firewall gateway TLS encryption utilizing MD5_RSA.The analysis results shows that how to provide the point to point security between wireless client to web server by proper utilizing the hybrid security protocol.

Key-Words / Index Term

Opnet, Security, WAP, Gateway

References

[1] Rehunathan D, Bhatti S. Application of virtual mobile networking to real-time patient monitoring. InTelecommunication Networks and Applications Conference (ATNAC), 2010 Australasian 2010 Oct 31 (pp. 124-129). IEEE
[2] Gustafsson E, Jonsson A. Always best connected. Wireless Communications, IEEE. 2003 Feb;10(1):49-55.
[3] Tanenbaum A.S. "Computer Networks," Prentice Hall India (PHI), November 1998.
[4] Tuladhar SR, Caicedo CE, Josh JB. Inter-domain authentication for seamless roaming in heterogeneous wireless networks. InSensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC`08. IEEE International Conference on 2008 Jun 11 (pp. 249-255). IEEE.
[5] Tuladhar SR, Caicedo CE, Josh JB. Inter-domain authentication for seamless roaming in heterogeneous wireless networks. InSensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC`08. IEEE International Conference on 2008 Jun 11 (pp. 249-255). IEEE..
[6] IEEE Computer Society LAN MAN Standards Committee. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications..
[7] FON. (2012). Fon Passes 7 Million Hotspots. Available: www.fon.com,Access date: 22/02/2013.
[8] WAP Forum, Wireless Application Protocol Architecture Specification, WAP-210-WAPArch-200100712-a, 12-July- 2001 version, latest version is available at http://www.wapforum.com
[9] Inwhee Joe; Jaehyung Lee, "An Enhanced TCP Protocol for Wired/Wireless Networks," in INC, IMS and IDC, 2009. NCM `09. Fifth International Joint Conference on , vol., no., pp.531-533, 25-27 Aug. 2009
[10] Filho, T.A.S.; da Silva, A.C.R.; Grout, I.A.; Rossi, S.R., "Network node with wireless and wired interfaces: Nios II processor and uClinux to development of a NCAP embedded (IEEE 1451.1) with two interfaces, wireless (IEEE 1451.5) and wired (IEEE p1451.2)," in Instrumentation and Measurement Technology Conference (I2MTC), 2011 IEEE , vol., no., pp.1-6, 10-12 May 2011
[11] Fuertes JA, Philipp M, Baccelli E. Routing across wired and wireless mesh networks: Experimental compound internetworking with OSPF. InWireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International 2012 Aug 27 (pp. 739-745). IEEE.
[12] Dellutri, F.; Gianluigi Me; Strangio, M.A., "Local Authentication with Bluetooth enabled Mobile Devices," in Autonomic and Autonomous Systems and International Conference on Networking and Services, 2005. ICAS-ICNS 2005. Joint International Conference on , vol., no., pp.72-72, 23-28 Oct. 2005
[13] Karthikeyan, Sindhu, and Mikhail Nesterenko. "RFID security without extensive cryptography." Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. ACM, 2005
[14] Diffie Hellman Key Exchange –A Non –Mathematician’s Explanation. Global Knowledge-Expert reference series of white papers. Link available at http://www.recursosvoip.com/docs/english/WP_Palmgren_DH.pdf
[15] Complete WAP Security from Certicom pages 5-12
[16] Csernai, M`rton; Gulyas, A., "Wireless Adapter Sleep Scheduling Based on Video QoE: How to Improve Battery Life When Watching Streaming Video?," in Computer Communications and Networks (ICCCN), 2011 Proceedings of 20th International Conference on , vol., no., pp.1-6, July 31 2011-Aug. 4 2011
[17] Shie-Yuan Wang; Chin-Liang Chou, "The Effects of Using Roadside Wireless Repeaters on Extending Path Lifetime in Vehicle-Formed Mobile Ad Hoc Networks on Highways," in Systems, Man and Cybernetics, 2006. SMC `06. IEEE International Conference on , vol.3, no., pp.2069-2074, 8-11 Oct. 2006
[18] Rikure, Tatiana, and Alexey Jurenoks. "WIRELESS NETWORK TECHNOLOGIES IN TRANSPORT AREA: SECURITY AND E-LEARNING APPLICATIONS." Wireless technologies, security, wireless enabled teaching, application, IEEE 802 (2005).
[19] Arbaugh, W.A.; Shankar, N.; Wan, Y.C.J.; Kan Zhang, "Your 80211 wireless network has no clothes," in Wireless Communications, IEEE , vol.9, no.6, pp.44-51, Dec. 2002
[20] Gupta, Er Anuj K., B. Lonia, and Er Vikas Gupta. "WIRELESS TECHNOLOGIES–AN OVERVIEW."