This document discusses providing security to wireless packet networks using an optimized security method. It proposes encrypting data packets when they are scheduled using the Blowfish encryption algorithm. This would secure the packets at the initial level of scheduling, preventing attackers from modifying packets even if they are delayed. The document outlines the Blowfish algorithm and its use of variable-length keys and data encryption in rounds to encrypt packets. It also describes the system model used and assumptions made, including modeling the wireless channel as a switch and defining packet attributes like arrival time, processing time, security level and deadline. Encrypting packets at the scheduling level with Blowfish aims to securely transmit real-time data over wireless networks.