Open Access Open Access  Restricted Access Subscription or Fee Access

New Theory of Wireless Network Communication Security based on Probabilistic Signal Transmission

Abhishek Badholia, Vijayant Verma, Sunil Kumar Kashyap

Abstract


This study presents a new theory of wireless communication security (WCS) which is based on the probability. The probabilistic signal transmission theory applies on wireless communication for transforming a secret system of wireless communication. A statistical analysis of wireless network over the probability is presented in this study. Wireless network is also reviewed by probability distribution. The probability density function (PDF) is applied over the wireless network. Some of the new wireless security models are proposed in this study. The network topology is considered to improve the security of wireless network. The efficiency and security both are studied simultaneously by the probability and statistical models.

Keywords: Wireless communication security, Probability, Wireless network, Network topology

Full Text:

PDF

References


IEEE Standard for local and metropolitan area networks. Wireless LAN Medium Access Control (MAC) and Physical Layer Specifications. ANSI/IEEE Std 802.11, 1999 Edn (R2003).

Shin M, Ma J, Mishra A, Arbaugh WA. Wireless network security and interworking. Proceedings of IEEE. Feb 2006; 94(2): 455–466p.

Shunman W, Ran T, Yue W, ZhangJi. Wireless LAN and it's security problem. Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2003. PDCAT'2003.

Matthew S. Gast, 802.11 Wireless Networks, O’REILLY, 2002.

Stallings W. Cryptography and Network Security, Principles and Practices, 3rd Edn, Prentice Hall 2003.

Sorman M, Kovac T, Maurovic D. Implementing Improved WLAN security. 46th International Symposium Electronics in Marine. ELMAR-2004, Zadar. Croatia, 16–18 June 2004.

Park JS, Dicoi D. WLAN Security: Current and Future. IEEE Computer Society, Oct 2003.

Mead NR, McGraw G. Wireless Security’s Future. IEEE Computer Society, IEEE Security and Privacy, Aug 2003.

Williams J. Providing for Wireless LAN Security, Part 2. IEEE IT Pro, November | December 2002. International Journal of Computer Science and Network Security (IJCSNS). May 2006; 6(5B): 156p.

Jyh-cheng Chen, Ming-chia Jiang, Yi-Wen Liu.Wireless LAN Security and IEEE802.11i. IEEE Wireless Communications. Feb 2005.

Arbaugh WA. Wireless Security is Different. IEEE Computer Magazine. Aug 2003.

Arbaugh WA, Shankar N, Zhang K, Justing Wan YC. Your 802.11 Wireless networks has no cloths. IEEE Wireless Communications, Dec 2002.

WEPCRACK, Software, http://www.

sourceforge.net/projects/wepcrack.

Air Snort Software, http://airsnort.shmoo.com Next important software is AirSnort [14]. This comprises with an analysis of efficiency of wireless devices.

Ethereal Software, http://www.

ethereal.com An Etherreal.

KISMET Software, http://www.

kismetwireless.net The improvement and performance analysis are conducted by KISMET software.

Brown B. 802.11: the security differences between b and I. IEEE Potentials, October/November 2003.

Branch JW, Petroni NL, Leendert Van Doorn JR, Safford D. Autonomic 802.11 Wireless LAN Security Auditing. IEEE Security and Privacy. 2004.

Cisco Systems. Wireless LAN Security. Feb 2001, (online) [Available: http://mithras.itworld.

com/WhitePapers/Cisco/WLAN_W P_BW7012.pdf] .

IEEE Standard for local and metropolitan area networks. Wireless LAN Medium Access Control (MAC) and Physical Layer Specifications, Medium Access Control (MAC) Security Enhancements. ANSI/IEEE Std 802.11i, 2004 Edn.

Karygiannis T, Owens L. Wireless Network Security: 802.11, Bluetooth and Handheld Devices. National Institute of Standard and Technology. Nov 2002.

Walker J. 802.11 Security Series Part I: The Wired Equivalent Privacy (WEP). February 2002. (online) Intel Corporation.

Wright J. Detecting Wireless LAN MAC Address Spoofing. Jan 2003. (online)

Convery S, Miller D, Sundaralingam S. Cisco SAFE: Wireless LAN Security in Depth. October 2003. (online). Cisco Systems

Borisov N, Goldberg I, Wagner D. Intercepting Mobile Communications: The insecurity of IEEE802.11. 7th Annual International Conference on Mobile Computing and Networking. July 2001.

IEEE Standard for local and metropolitan area networks. Port-based Network Access Control. IEEE Std 802.1x, 2001 Edn (R2004). The port based network access control is proposed in the white paper [26]. This lies with the LAN and MAN.

IETF, RFC 3748. Extensible Authentication Protocol (EAP) (online) IETF Website [Available: http://www.ietf.org/rfc/rfc3748.txt].

IETF, RFC2716. PPP EAP TLS Authentication Protocol (online) IETF Website [Available: http://www.ietf.org/rfc/rfc2716.txt]

IETF, RFC 2246. The TLS Protocol Version 1.0. (online) IETF Website [Available: http://www.ietf.org/rfc/rfc2246.txt]

Jesse Walker. 802.11 Security Series Part II: The Temporal Key Integrity Protocol (TKIP). April 2002 (online). Intel Corporation. [Available: http://www.intel.com/cd/ids/developer/asmona/eng/technologies/security/topics/19181.html.

Nancy Cam-Winget, Tim Moore, Dorothy Stanley, Jesse Walker. IEEE 802.11i Overview" December 2002 (online). [Available: http://csrc.nist.gov/wireless/S10_802.11i%20Overviewjw1.pdf].

IETF, RFC2401, Security architecture for the Internet Protocol (online) IETF Website [Available: http://www.ietf.org/rfc/rfc2401.txt].

Virendra M, Upadhyaya S. SWAN: A Secure Wireless LAN Architecture. Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN’04), 2004.

Shankar N, William A. Arbaugh and Kan Zhang, “A Transparent Key Management Scheme for Wireless LANs Using DHCP” September 2001. (online) HP Website [Available: http://www.hpl.hp.com/techreports/2001/HPL-2001- 227.pdf].

Carey JM, Grunwald D. Enhancing WLAN Security with Smart Antennas, A Physical Layer Response for Information Assurance. IEEE 60th Vehicular Technology Conference, VTC2004, Fall 2004.

Smyth N, McLoone M, McCanny JV. Reconfigurable hardware acceleration of WLAN security. IEEE Workshop on Signal Processing Systems SIPS, 2004.




DOI: https://doi.org/10.37591/jscrs.v4i2.926

Refbacks

  • There are currently no refbacks.