SlideShare a Scribd company logo
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012


     Providing Security to Wireless Packet Networks by using
                   Optimized Security Method
                              N. Paparayudu*     G. Suresh Kumar J.Srikanth
         Aurora’s Engineering College, Raigir, Bhongir, Nalgonda Dist, Andhra Pradesh, India.
    * E-mail of the corresponding author: rayudu8_n@yahoo.co.in


Abstract
Now-a-days technology is growing very fast, due to rapid development of the technology in computer
arena, communication through network become a habit to the users. Communication through network is
happen using two channels i.e., by connection oriented and connection less. At present users prefer wireless
networks for communication and transferring data due to its flexibility. So in this paper we are focusing on
wireless networking, as it is not reliable we are proposing an optimized security technique to provide
security to the communication on wireless. In this paper we mainly focus on packet scheduling which plays
the vital role in the transmission of data over wireless networks. We are using optimized security technique
to secure the packets at initial level itself while scheduling the packets.
Keywords: Real-Time Packets, Packet Scheduling, Wireless Networks, Security, Cryptography, Secret
key, Bandwidth.

1. Introduction
The quirky thing about a wireless network is that you cannot always see what you are dealing with. In a
wireless network, establishing connectivity is not a simple task like plugging in a cable, providing physical
security is not easy by keeping unauthorized individuals out of a facility, and troubleshooting even trivial,
issues can sometimes result in a few expletives being thrown in the general direction of an access point. [4]
It should be noted that supporting efficient and reliable data transmission, especially real time data
transmission, over wireless networks is extremely difficult and challenging because wireless networks must
be facing more complicated environments compared with conventional wired networks.
For instance, wireless networks could be disturbed by radio wave and thunderstorms or blocked by physical
objects like mountains or skyscrapers. Even worse, high mobility coupled with a variety of explosively
increased users makes existing security policies in wireless networks inefficient or even useless, meaning
that wireless networks can be easily attacked by computer viruses, worms, spy wares, and similar threats.
These security threats cause downtime or continual patching in wireless networks and thus lead to severe
disruption in wireless commercial business. Therefore, boosting security of wireless networks has become
one of the most important issues in the arena of wireless communications. [1]
With the rapid growth of needs for wireless multimedia applications and wireless data services, it is
expected that the future broadband wireless networks will support the transmission of heterogeneous
classes of traffic (e.g., realtime and non-realtime traffic flows). The design of broadband wireless networks
introduces a set of challenging technical issues. Among all these issues that need to be resolved, packet
scheduling problem is one of the most important. It is well known that, the bandwidth resource of wireless
networks is very scarce. Scheduling algorithms, which are in charge of the bandwidth allocation and
multiplexing, have major influence on the network performance. [2]
However, in packet cellular environments, user mobility and wireless channel error make it very difficult to
perform either resource reservation or fair packet scheduling. While there have been some recent efforts to
provide resource reservation for mobile flows in packet cellular networks, the problem of fair packet
scheduling in wireless networks has remained largely unaddressed. In fact, even the notion of fairness in
shared channel wireless networks has not been precisely defined. [3]
At the packet level wireless networks are similar to wired networks in most ways. Wireless networks still
use TCP/IP for data communication and abide by all of the same laws of networking as wired hosts. The
major difference between the two networking platforms is found at the lower layers of the OSI model.


                                                     30
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
Wireless networks communicate by sending data over the air as opposed to sending data across a wire. The
air that wireless data is communicated on is a shared medium, and because of that special consideration
must be given at the physical and data link layers to ensure that there are no data collisions and that data
can be delivered reliably. These services are provided by different mechanisms of the 802.11 standard. [4]
The primary difference between wireless and wired packets is the addition of the 802.11 header. This is a
layer two header that contains extra information about the packet and the medium it is transmitted on.
There are three types of 802.11 packets; data, management, and control.
   Management - These packets are used to establish connectivity between hosts at layer two. Some
important subtypes of management packets include authentication, association, and beacon packets.
   Control - Control packets allow for delivery of management and data packets and are concerned with
congestion management. Common subtypes include Request-to-Send and Clear-to-Send packets.
   Data - These packets contain actual data and are the only packet type that can be forwarded from the
wireless network to the wired network. [4]
In this paper we are proposing a blow fish security technique to encrypt the data packets at the time of
packet scheduling is done, due to this decryption of the packet will not be possible by the attacker on the
packet even though the packets are delay.
That being said, securing wireless networks will continue to be a challenge for the foreseeable future.


2. Related Work
In the literature, there are many schemes and protocols devoted to deal with the problem of packet
scheduling. We broadly classify existing scheduling algorithms into three categories. A brief introduction of
them follows.

2 2.1. Algorithms in wire line environment:
Algorithms of first come- first-served (FCFS) and round robin (RR) are first developed for wire line
networks. Their original versions and improved versions (e.g., Weighted Round Robin and Deficit Round
Robin) are underlying schemes for wireless networks because of the simplicity and ease of implementation.
Their drawback lies in the lack of consideration on the issues of bandwidth utilization and fairness
guarantee.

3 2.2. Algorithms in wireless environment with GE-model:
The classical two-state Gilbert-Eilliot (GE) model is firstly used to model the wireless link variation. The
channel is simply described to be either in “good” or “bad” state in this model. A survey of this class of
scheduling algorithms can be found in [5]. Work in [6] devised Idealized Weight Fair Queuing (IWFQ)
algorithm. In [7], Channel-condition Independent Fair Queuing (CIF-Q) algorithm was put forward. Both
algorithms of IWFQ and CIF-Q need to simulate a virtual error-free fair queuing system, and try to
schedule packets in the same order as the ideal reference system does. IWFQ and CIF-Q differ in the way
they compensate the lagging flows. Authors of [8] presented Token Bank Fair Queuing (TBFQ) algorithm,
which uses token pools and token bank to keep track of the service status of each flow, and dynamically
regulate the flows’ priorities to occupy the channel resource. All these three algorithms achieve good
performance tradeoff among the three performance issues aforementioned. But they only work under the
GE channel model, which is too coarse to characterize the fluctuation of wireless channel condition.
Since security concern plays a vital role in the design and development of wireless mobile commercial
applications, international wireless organizations, wireless equipment providers and academic researchers
made extreme efforts in maximizing the features of existing security mechanisms and finding innovative
security policies of wireless networks. IEEE improved the security character of 802.11 by designing
802.1X and 802.11i for WLAN [9]. 802.1X, a port-level access control protocol, provides a security
framework for IEEE networks, including Ethernet and wireless networks. The 802.11i standard, also still in
draft, was created for wireless-specific security functions that operate with IEEE 802.1X. Cisco provides
the solutions for wireless applications by using strong encryption technology and providing unified WLAN
[10]. Papers addressing the security problems also provide valuable solutions for wireless business
applications [11] [12] [13] [14].
However, most of the efforts were made at the levels of protocols or systems; most existing approaches
were focused on non-real time wireless applications. Packet scheduling plays an important role in achieving


                                                     31
Network and Complex Systems                                                                    www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
high performance in real-time wireless networks. A real time scheduler needs to guarantee both security and
real-time constraints of packets even in the presence of hardware and software faults [15] [16]. Real time
scheduling algorithms can be classified into static [17] [28] and dynamic [19] [20] strategies.


3. Methodology

4    3.1 Problem Definition
  According to Xiao Qin, Mohamed Alghamdi, Mais Nijim, Ziliang Zong, Kiranmai Bellam, Xiaojun
Ruan, and Adam Manzanares et al, they are concentrating on the delay time of the packet delivery based on
time scheduling; they are providing security at the time administrator identifies the delay of packet. The
motto of this paper is to provide the security at the initial level while the packet is scheduled so that the
attacker cannot do any kind of modification to the packet even though they trace the packet here we are
concentrating on the security of the packet.
In this paper we are discussing how to secure the packet from the attackers instead of depending on the
delay time of the packet and think that the packet is damaged, in the proposed system the duty of the
admission controller is to check with the packet and its structure if it is in the correct format the admission
controller pushes the packet.

5 3.2 Solution
As per the discussions, we are providing security to the packets while the packet is scheduling using
BlowFish algorithm.

6 3.2.1 BlowFish
Blowfish is a variable-length key block cipher. It does not meet all the requirements for a new
cryptographic standard discussed above: it is only suitable for applications where the key does not change
often, like a communications link or an automatic file encryptor. It is significantly faster than DES when
implemented on 32-bit microprocessors with large data caches, such as the Pentium and the PowerPC. [22]
a)        Algorithm
Blowfish is a variable-length key, 64-bit block cipher. The algorithm consists of two parts: a key-expansion
part and a data- encryption part. Key expansion converts a key of at most 448 bits into several sub key
arrays totaling 4168 bytes. Data encryption occurs via a 16-round Feistel network. Each round consists of a
key-dependent permutation, and a key- and data-dependent substitution. All operations are XORs and
additions on 32-bit words. The only additional operations are four indexed array data lookups per
round.[22]
Sub keys: Blowfish uses a large number of sub keys. These keys must be pre-computed before any data
encryption or decryption.
1. The P-array consists of 18 32-bit sub keys:
P1, P2,..., P18.
2. There are four 32-bit S-boxes with 256 entries each:
S1,0, S1,1,..., S1,255;
S2,0, S2,1,..,, S2,255;
S3,0, S3,1,..., S3,255;
S4,0, S4,1,..,, S4,255.
The exact method used to calculate these sub keys will be described later.
Encryption:
Blowfish is a Feistel network consisting of 16 rounds (see Figure 1). The input is a 64-bit data element, x.
Divide x into two 32-bit halves: xL, xR
For i = 1 to 16:
xL = xL XOR Pi
xR = F(xL) XOR xR
Swap xL and xR
Next i
Swap xL and xR (Undo the last swap.)
xR = xR XOR P17


                                                      32
Network and Complex Systems                                                                    www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
xL = xL XOR P18
Recombine xL and xR
Function F (see Figure 2):
Divide xL into four eight-bit quarters: a, b, c, and d
F(xL) = ((S1,a + S2,b mod 232) XOR S3,c) + S4,d mod 232
Decryption is exactly the same as encryption, except that P1, P2,..., P18 are used in the reverse order.
Implementations of Blowfish that require the fastest speeds should unroll the loop and ensure that all sub
keys are stored in cache.
Generating the Subkeys:
The sub keys are calculated using the Blowfish algorithm. The exact method is as follows:
     1. Initialize first the P-array and then the four S-boxes, in order, with a fixed string. This string
          consists of the hexadecimal digits of pi (less the initial 3). For example:
          • P1 = 0x243f6a88
          • P2 = 0x85a308d3
          • P3 = 0x13198a2e
          • P4 = 0x03707344
     2. XOR P1 with the first 32 bits of the key, XOR P2 with the second 32-bits of the key, and so on for
          all bits of the key (possibly up to P14). Repeatedly cycle through the key bits until the entire P-
          array has been XORed with key bits. (For every short key, there is at least one equivalent longer
          key; for example, if A is a 64-bit key, then AA, AAA, etc., are equivalent keys.)
     3. Encrypt the all-zero string with the Blowfish algorithm, using the subkeys described in steps (1)
          and (2).
     4. Replace P1 and P2 with the output of step (3).
     5. Encrypt the output of step (3) using the Blowfish algorithm with the modified subkeys.
     6. Replace P3 and P4 with the output of step (5).
     7. Continue the process, replacing all entries of the P- array, and then all four S-boxes in order, with
          the output of the continuously-changing Blowfish algorithm. [22]
   In total, 521 iterations are required to generate all required sub keys. Applications can store the sub keys
rather than execute this derivation process multiple times.

b)        The system model and assumptions
In recent studies, a system model is proposed for wireless channel as an NN switch. Although each wireless
node may have a single transmitter and a single receiver, it is common that the transmitter and receiver are
combined in a transceiver. As such, a node cannot transmit and receive packages simultaneously. In our
switch model, there exists a packet scheduler matching transmitters to corresponding receivers. The
detailed information regarding the switch model can be found in [21]. In addition to the switch, other three
key components in the system include a Security Level Controller (SLC), an Admission Controller (AC),
and an EDF (Earliest Deadline First) scheduler as depicted in Fig. 1. This architecture is designed for a link
between two nodes in a wireless network. All packets are submitted independently to the wireless link with
arrival rates abided by Poisson distribution. The function of the Admission Controller is to determine
whether incoming packets can be accepted or not. The Security Level Controller aims at increasing security
levels of real-time packets residing in the Accepted queue that can be finished before their deadlines. The
EDF scheduler makes use of the Earliest Deadline First policy to schedule admitted packets in which
security levels are maximized by the Security Level Controller.

c)        The packet model
Our packet model assumes that all packets have soft deadline and each packet is independent of one
another. We also assume that packets’ arrival times follow the classical Poisson distribution. Packet Pi is
represented as a tuple (ATi, PTi, SLi, Di), where ATi and PTi denote the arrival time and the processing time
of packet i. SLi and Di represent the security level and soft deadline of packet i. Besides, without loss of
generality we assume that each packet is assigned a quality of security measured as a security level SLi that
in the range [1, 2,….., 10], where 1 and 10 are the lowest and highest levels of security. For example, if
packet i has a value of 1 as a security level, this means that the packet has the lowest security level.
Although wireless network devices are unable to determine security levels, packets’ security levels can be
straightforwardly derived from the security requirements of applications. [1]

                                                      33
Network and Complex Systems                                                                     www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
To calculate the security overhead without loss of generality, we make use of formula (1) to model the
security overhead envisioned as the extra processing time experienced by packet i.
    SOi = ETi * (SLi/R)
                                                                         (1)
where SOi is the security overhead of packet i, SLi is the security level provided to packet i, ETi is the
transmission time of the packet. And R is set to 10. Thus, the total processing time WLi of packet i can be
expressed as:
                        WLi = ETi + SOi = ETi * (1 + SLi/R)                               (2)
d)         The SPSS Algorithm
The main goal of this study is to maximize the overall system performance, which reflects the guarantee
ratio and security level. To achieve this goal, we designed the SPSS scheduling algorithm with security
awareness. SPSS aims to maintain high guarantee ratios while maximizing the security levels. We can
accomplish high performance and high security level by applying the Security Level Controller to our
SPSS algorithm. Fig. 2 below outlines the flow chart of the security-aware packet-scheduling algorithm
(SPSS) for wireless links. The SPSS algorithm strives to maximize the security level of a packet residing in
the accepted queue while making the best effort to guarantee its deadline. If the deadline of the packet can
be met, the packet will be admitted in the accepted queue. Otherwise, the packet will be dropped and placed
in the rejected queue. The following constraint shows whether the packet is equipped to meet its deadline.
 CTi − STi <= di where STi is the start time of transmission of the ith packet, CTi is the completion time of
the transmission, and di is the packet’s deadline. The packets stored in the accepted queue are scheduled
depending on their specified deadlines, meaning that the packets with earlier deadlines will be processed
first. The SPSS algorithm initializes the security levels of all packets to the minimum levels. Then, SPSS
gradually enhances the security level of each packet Pi under the condition that (1) the current packet Pi
can be transmitted before its deadline; and (2) the deadlines of the packets being processed later than Pi
also can be guaranteed. The above criterion is important and reasonable because if a packet is admitted to
the real-time wireless link, then the packet’s timing constraint has to be guaranteed. In other words, the
SPSS algorithm ensures that an admitted packet is not adversely affected by subsequently admitted packets.
[1]
The following steps delineate the procedure of the SPSS scheduling.
Step 1: initialize the scheduler; the security values of incoming packets; and the number of rejected packets
is set to zero. Wait for any incoming packets.
Step 2: if a packet I arrives and it is the only packet available, process the packet immediately using its
highest security level. The starting time (STi) and the completion time (CTi) of the packet are calculated.
Step 3: All the packets arriving in the scheduler during the time period [STi, CTi] are temporarily stored
into a waiting queue in the non-decreasing order of their deadlines. The starting time of the next packet STi
+ 1 is set to CTi.
Step 4: the admission controller is responsible for deciding whether a packet in the waiting queue can be
accepted by considering the deadline of this packet. If the packet’s deadline and security requirement can
both be guaranteed, the packet will be forwarded into the accepted queue (step 3 and step5). Otherwise,
being put into the rejected queue will drop the packet; the number of rejected packets is increased by one.
Step 5: the security level controller raises the security levels of all the packets residing in the accepted
queue as high as possible. The enhancements of the security levels for real-time packets residing in the
accepted queue are subject to the following two constraints: (1) Increasing of an accepted packet’s security
level should still guarantee the deadline of the packet. (2) The increase of security levels must not lead to
any rejection of currently accepted packet. Step 6: At this point, the security level SLi+1 of the next starting
packet is maximized. The packet’s completion time CTi+1 is calculated. Steps 3-6 are repeatedly executed
until all the arriving packets are processed in one run. [1]

5. Conclusion
Providing security at the time of packet scheduling will help the admission controller to push the packets
instead of wasting time by rejecting the packet and providing the level of security to the packet based on
the rejection. That being said, securing wireless networks will continue to be a challenge for the foreseeable
future.



                                                      34
Network and Complex Systems                                                                  www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
References
[1] Xiao Qin, Mohamed Alghamdi, Mais Nijim, Ziliang Zong, Kiranmai Bellam, Xiaojun Ruan, and Adam
     Manzanares, “Improving Security of Real-Time Wireless Networks Through Packet Scheduling”,
     IEEE Transaction on Wireless Communications, Vol. 7, No. 9, September 2008, Page No: 3273-3279.
[2] Rong Yu, Zhi Sun, and Shunliang Mei , “Packet Scheduling in Broadband Wireless Networks Using
     Neuro-Dynamic Programming”, 1550-2252/$25.00 ©2007 IEEE, page No: 2776-2780.
[3] Songwu Lu, Vaduvur Bharghavan, R. Srikant, “Fair Scheduling in Wireless Packet Networks”,
     IEEE/ACM Transactions on Networking, Vol. 7, No. 4, August 1999. Page No: 473-489.
[4] Chris Sanders, "Analyzing Wireless Network Security at the packet Level", Articles Misc Network
     Security, published on Aug 11, 2010.
[5] Y. Cao and V. O. K. Li, “Scheduling algorithm in broad-band wireless networks,” in Proc. of the IEEE
     vol. 89, no. 1, pp. 76-87, Jan. 200l.
[6] S. Lu and V. Bharghavan, “Fair scheduling in wireless packet networks,” IEEE/ACM Trans.
     Networking, vol. 7, no. 4, pp. 473-489, 1999.
[7] T. S. Eugene Ng, I. Stoica, and H. Zhang, “Packet fair queueing algorithms for wireless networks with
     location-dependent errors,” in Proc. INFOCOM98, pp. 1103-1111, Mar. 1998.
[8] W. K. Wong, J. Zhu, and V. C. M. Leung, “Soft-QoS provisioning using the token bank fair queueing
     scheduling algorithm,” IEEE Wireless Communication Magazine, Jun. 2003.
[9] T. Karygiannis and L. Owens, “Wireless Network Security 802.11, Bluetooth and Handheld Devices,”
     chapter 2, http://csrc.nist.gov/publications/nistpubs/ 800-48/NIST SP 800-48.pdf.
[10] White paper of Cisco, “Building the mobile business with a unified wireless network
     http://epsfiles.intermec.com/eps files/eps wp/CISCO SecuringWirelessLAN wpweb.pdf.
[11] M. A Badamas, “Mobile computing systems–security considerations,” Information Management and
     Security 2001, pp. 134–136.
[12] V. Gupta and S. Gupta, “Securing the wireless Internet,” IEEE Commun. Mag., pp. 68–74, Dec. 2001.
[13] O. M. Karygiannis, Wireless Network Security, NIST special publication 800–48.
[14] K. Siau, E. P. Lim, and Z. Shen, “Mobile commerce: promises, challenges and research agenda,” J.
     Database Management, vol. 12, pp. 4–19, July–Sept. 2001.
[15] X. Qin and H. Jiang, “Dynamic, reliability-driven scheduling of parallel real-time jobs in
     heterogeneous systems,” in Proc. Int’l Conf. on Parallel Processing, pp. 113–122, 2001.
[16] X. Qin, H. Jiang, D. R. Swanson, “An efficient fault-tolerant scheduling algorithm for real-time tasks
     with precedence constraints in heterogeneous systems,” in Proc. Int’l Conf. on Parallel Processing,
     British Columbia, Canada, pp. 360–368, Aug. 2002.
[17] J. C. Palencia and H. M. Gonzalez, “Schedulability analysis for tasks with static and dynamic offsets,”
     in Proc. 19th IEEE Real-Time Systems Symp. 1998, pp. 26–37.
[18] T. F. Abdelzaher and K. G. Shin, “Combined task and message scheduling in distributed real-time
     systems,” IEEE Trans. Parallel and Distributed Syst., vol. 10, no. 11, Nov. 1999.
[19] M. A. Palis, “Online real-time job scheduling with rate of progress guarantees,” in Proc. 6th Int’l
     Symp. Parallel Architectures, Algorithms, and Networks 2002, pp. 65–70.
[20] G. Manimaran and C. S. R. Murthy, “An efficient dynamic scheduling algorithm for multimachine real-
     time systems,” IEEE Trans. Parallel and Distributed Syst., vol.9, no. 3, pp. 312–319, 1998.
[21] S. Al-Harthi and R. Rao, “A switch model for improving throughput and power fairness in Bluetooth
     piconets,” in Proc. Globecom 2003, pp.1279–1283.
[22] B. Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)”, Fast
     Software Encryption, Cambridge Security Workshop Proceedings (December 1993), Springer-Verlag,
     1994, pp. 191-204.
N. Paparayudu, is pursing M.Tech in Software Engineering Stream, in the branch of Computer Science, in
Aurora’s Engineering College, Bhongir, Andhra Pradesh, India. His areas of interest are Data Engineering,
Wireless Networks, and Information Security. Email: rayudu8_n@yahoo.co.in.
G.Suresh Kumar, has Masters in Technology and Computer Application , and he has been working as an
Associate Professor in Aurora’s Engineering College, Bhongir, Andhra Pradesh, India. His areas of interest
are Data Engineering, Wireless Networks, Information Security, and Cloud Computing. Email:
suresh.virgo18@gmail.com
Srikanth Jatla, working as Associate Professor and Head of the Department of Computer Science and
Engineering at Aurora’s Engineering College with a teaching experience of 12years.He is a B.E and M.


                                                    35
Network and Complex Systems                                                             www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
Tech in Computer Science and pursuing his PhD in Data Stream Mining at JNTU, Hyderabad. His areas of
interest includes data structures, principles of programming languages, algorithm analysis and compiler
design, Email: jsrikanth@aurora.ac.in




                                        Figure 1. Feistel Cipher




                              Fig 2. The Architecture of Network System




                                                  36
Network and Complex Systems                                  www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012




                                 Fig 3. The SPSS Algorithm




                                            37
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

More Related Content

PDF
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
PDF
E42022125
PDF
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...
PDF
A decentralized paradigm for resource-aware computing in wireless Ad hoc netw...
PDF
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
PDF
A Study of Protocols for Grid Computing Environment
PDF
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
PDF
Framework for wireless network security using quantum cryptography
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
E42022125
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...
A decentralized paradigm for resource-aware computing in wireless Ad hoc netw...
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
A Study of Protocols for Grid Computing Environment
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
Framework for wireless network security using quantum cryptography

What's hot (19)

PDF
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
PDF
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
PDF
Dr2645024509
PDF
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
PDF
Low-cost wireless mesh communications based on openWRT and voice over interne...
PDF
Gateway Selection in Capillary Networks
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
PDF
Evaluation the performanc of dmz
PDF
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
PDF
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
PDF
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
PDF
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
PDF
CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...
PDF
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
PDF
Reliable and Efficient Routing in WLAN
PDF
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
PDF
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
Dr2645024509
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Low-cost wireless mesh communications based on openWRT and voice over interne...
Gateway Selection in Capillary Networks
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
Evaluation the performanc of dmz
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
Reliable and Efficient Routing in WLAN
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Ad

Viewers also liked (6)

PDF
Security vulnerabilities for grown ups - GOTOcon 2012
PPTX
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
DOC
Healthcare IT Security - Who's responsible, really?
PDF
A usability evaluation framework for b2 c e commerce websites
PDF
A validation of the adverse childhood experiences scale in
PDF
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Security vulnerabilities for grown ups - GOTOcon 2012
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
Healthcare IT Security - Who's responsible, really?
A usability evaluation framework for b2 c e commerce websites
A validation of the adverse childhood experiences scale in
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Ad

Similar to 11.providing security to wireless packet networks by using optimized security method (20)

PDF
Paper id 24201445
PDF
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...
PDF
05688207
PDF
A Review on Wireless Network Security.pdf
PDF
TCP for Wireless Environments
PDF
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
PDF
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
PDF
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
PDF
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
PDF
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODSWIRELESS COMMUNICA...
PDF
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
PDF
A Review of IP and MAC Address Filtering in Wireless Network Security
PDF
A Review Of IP And MAC Address Filtering In Wireless Network Security
PDF
General Model for Single and Multiple Channels WLANs with Quality of Service ...
DOCX
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
PDF
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
PDF
A Brief Review on Wireless Networks
PDF
General Model for Single and Multiple Channels WLANs with Quality of Service...
PDF
Sunilkumar2017
PDF
Sunilkumar2017
Paper id 24201445
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...
05688207
A Review on Wireless Network Security.pdf
TCP for Wireless Environments
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODSWIRELESS COMMUNICA...
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
General Model for Single and Multiple Channels WLANs with Quality of Service ...
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLAN
A Brief Review on Wireless Networks
General Model for Single and Multiple Channels WLANs with Quality of Service...
Sunilkumar2017
Sunilkumar2017

More from Alexander Decker (20)

PDF
A universal model for managing the marketing executives in nigerian banks
PDF
A unique common fixed point theorems in generalized d
PDF
A trends of salmonella and antibiotic resistance
PDF
A transformational generative approach towards understanding al-istifham
PDF
A time series analysis of the determinants of savings in namibia
PDF
A therapy for physical and mental fitness of school children
PDF
A theory of efficiency for managing the marketing executives in nigerian banks
PDF
A systematic evaluation of link budget for
PDF
A synthetic review of contraceptive supplies in punjab
PDF
A synthesis of taylor’s and fayol’s management approaches for managing market...
PDF
A survey paper on sequence pattern mining with incremental
PDF
A survey on live virtual machine migrations and its techniques
PDF
A survey on data mining and analysis in hadoop and mongo db
PDF
A survey on challenges to the media cloud
PDF
A survey of provenance leveraged
PDF
A survey of private equity investments in kenya
PDF
A study to measures the financial health of
PDF
A study to evaluate the attitude of faculty members of public universities of...
PDF
A study to assess the knowledge regarding prevention of pneumonia among middl...
PDF
A study regarding analyzing recessionary impact on fundamental determinants o...
A universal model for managing the marketing executives in nigerian banks
A unique common fixed point theorems in generalized d
A trends of salmonella and antibiotic resistance
A transformational generative approach towards understanding al-istifham
A time series analysis of the determinants of savings in namibia
A therapy for physical and mental fitness of school children
A theory of efficiency for managing the marketing executives in nigerian banks
A systematic evaluation of link budget for
A synthetic review of contraceptive supplies in punjab
A synthesis of taylor’s and fayol’s management approaches for managing market...
A survey paper on sequence pattern mining with incremental
A survey on live virtual machine migrations and its techniques
A survey on data mining and analysis in hadoop and mongo db
A survey on challenges to the media cloud
A survey of provenance leveraged
A survey of private equity investments in kenya
A study to measures the financial health of
A study to evaluate the attitude of faculty members of public universities of...
A study to assess the knowledge regarding prevention of pneumonia among middl...
A study regarding analyzing recessionary impact on fundamental determinants o...

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Modernizing your data center with Dell and AMD
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
A Presentation on Artificial Intelligence
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Encapsulation_ Review paper, used for researhc scholars
Modernizing your data center with Dell and AMD
Understanding_Digital_Forensics_Presentation.pptx
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx
MYSQL Presentation for SQL database connectivity
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Digital-Transformation-Roadmap-for-Companies.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
A Presentation on Artificial Intelligence
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
“AI and Expert System Decision Support & Business Intelligence Systems”

11.providing security to wireless packet networks by using optimized security method

  • 1. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 Providing Security to Wireless Packet Networks by using Optimized Security Method N. Paparayudu* G. Suresh Kumar J.Srikanth Aurora’s Engineering College, Raigir, Bhongir, Nalgonda Dist, Andhra Pradesh, India. * E-mail of the corresponding author: rayudu8_n@yahoo.co.in Abstract Now-a-days technology is growing very fast, due to rapid development of the technology in computer arena, communication through network become a habit to the users. Communication through network is happen using two channels i.e., by connection oriented and connection less. At present users prefer wireless networks for communication and transferring data due to its flexibility. So in this paper we are focusing on wireless networking, as it is not reliable we are proposing an optimized security technique to provide security to the communication on wireless. In this paper we mainly focus on packet scheduling which plays the vital role in the transmission of data over wireless networks. We are using optimized security technique to secure the packets at initial level itself while scheduling the packets. Keywords: Real-Time Packets, Packet Scheduling, Wireless Networks, Security, Cryptography, Secret key, Bandwidth. 1. Introduction The quirky thing about a wireless network is that you cannot always see what you are dealing with. In a wireless network, establishing connectivity is not a simple task like plugging in a cable, providing physical security is not easy by keeping unauthorized individuals out of a facility, and troubleshooting even trivial, issues can sometimes result in a few expletives being thrown in the general direction of an access point. [4] It should be noted that supporting efficient and reliable data transmission, especially real time data transmission, over wireless networks is extremely difficult and challenging because wireless networks must be facing more complicated environments compared with conventional wired networks. For instance, wireless networks could be disturbed by radio wave and thunderstorms or blocked by physical objects like mountains or skyscrapers. Even worse, high mobility coupled with a variety of explosively increased users makes existing security policies in wireless networks inefficient or even useless, meaning that wireless networks can be easily attacked by computer viruses, worms, spy wares, and similar threats. These security threats cause downtime or continual patching in wireless networks and thus lead to severe disruption in wireless commercial business. Therefore, boosting security of wireless networks has become one of the most important issues in the arena of wireless communications. [1] With the rapid growth of needs for wireless multimedia applications and wireless data services, it is expected that the future broadband wireless networks will support the transmission of heterogeneous classes of traffic (e.g., realtime and non-realtime traffic flows). The design of broadband wireless networks introduces a set of challenging technical issues. Among all these issues that need to be resolved, packet scheduling problem is one of the most important. It is well known that, the bandwidth resource of wireless networks is very scarce. Scheduling algorithms, which are in charge of the bandwidth allocation and multiplexing, have major influence on the network performance. [2] However, in packet cellular environments, user mobility and wireless channel error make it very difficult to perform either resource reservation or fair packet scheduling. While there have been some recent efforts to provide resource reservation for mobile flows in packet cellular networks, the problem of fair packet scheduling in wireless networks has remained largely unaddressed. In fact, even the notion of fairness in shared channel wireless networks has not been precisely defined. [3] At the packet level wireless networks are similar to wired networks in most ways. Wireless networks still use TCP/IP for data communication and abide by all of the same laws of networking as wired hosts. The major difference between the two networking platforms is found at the lower layers of the OSI model. 30
  • 2. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 Wireless networks communicate by sending data over the air as opposed to sending data across a wire. The air that wireless data is communicated on is a shared medium, and because of that special consideration must be given at the physical and data link layers to ensure that there are no data collisions and that data can be delivered reliably. These services are provided by different mechanisms of the 802.11 standard. [4] The primary difference between wireless and wired packets is the addition of the 802.11 header. This is a layer two header that contains extra information about the packet and the medium it is transmitted on. There are three types of 802.11 packets; data, management, and control. Management - These packets are used to establish connectivity between hosts at layer two. Some important subtypes of management packets include authentication, association, and beacon packets. Control - Control packets allow for delivery of management and data packets and are concerned with congestion management. Common subtypes include Request-to-Send and Clear-to-Send packets. Data - These packets contain actual data and are the only packet type that can be forwarded from the wireless network to the wired network. [4] In this paper we are proposing a blow fish security technique to encrypt the data packets at the time of packet scheduling is done, due to this decryption of the packet will not be possible by the attacker on the packet even though the packets are delay. That being said, securing wireless networks will continue to be a challenge for the foreseeable future. 2. Related Work In the literature, there are many schemes and protocols devoted to deal with the problem of packet scheduling. We broadly classify existing scheduling algorithms into three categories. A brief introduction of them follows. 2 2.1. Algorithms in wire line environment: Algorithms of first come- first-served (FCFS) and round robin (RR) are first developed for wire line networks. Their original versions and improved versions (e.g., Weighted Round Robin and Deficit Round Robin) are underlying schemes for wireless networks because of the simplicity and ease of implementation. Their drawback lies in the lack of consideration on the issues of bandwidth utilization and fairness guarantee. 3 2.2. Algorithms in wireless environment with GE-model: The classical two-state Gilbert-Eilliot (GE) model is firstly used to model the wireless link variation. The channel is simply described to be either in “good” or “bad” state in this model. A survey of this class of scheduling algorithms can be found in [5]. Work in [6] devised Idealized Weight Fair Queuing (IWFQ) algorithm. In [7], Channel-condition Independent Fair Queuing (CIF-Q) algorithm was put forward. Both algorithms of IWFQ and CIF-Q need to simulate a virtual error-free fair queuing system, and try to schedule packets in the same order as the ideal reference system does. IWFQ and CIF-Q differ in the way they compensate the lagging flows. Authors of [8] presented Token Bank Fair Queuing (TBFQ) algorithm, which uses token pools and token bank to keep track of the service status of each flow, and dynamically regulate the flows’ priorities to occupy the channel resource. All these three algorithms achieve good performance tradeoff among the three performance issues aforementioned. But they only work under the GE channel model, which is too coarse to characterize the fluctuation of wireless channel condition. Since security concern plays a vital role in the design and development of wireless mobile commercial applications, international wireless organizations, wireless equipment providers and academic researchers made extreme efforts in maximizing the features of existing security mechanisms and finding innovative security policies of wireless networks. IEEE improved the security character of 802.11 by designing 802.1X and 802.11i for WLAN [9]. 802.1X, a port-level access control protocol, provides a security framework for IEEE networks, including Ethernet and wireless networks. The 802.11i standard, also still in draft, was created for wireless-specific security functions that operate with IEEE 802.1X. Cisco provides the solutions for wireless applications by using strong encryption technology and providing unified WLAN [10]. Papers addressing the security problems also provide valuable solutions for wireless business applications [11] [12] [13] [14]. However, most of the efforts were made at the levels of protocols or systems; most existing approaches were focused on non-real time wireless applications. Packet scheduling plays an important role in achieving 31
  • 3. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 high performance in real-time wireless networks. A real time scheduler needs to guarantee both security and real-time constraints of packets even in the presence of hardware and software faults [15] [16]. Real time scheduling algorithms can be classified into static [17] [28] and dynamic [19] [20] strategies. 3. Methodology 4 3.1 Problem Definition According to Xiao Qin, Mohamed Alghamdi, Mais Nijim, Ziliang Zong, Kiranmai Bellam, Xiaojun Ruan, and Adam Manzanares et al, they are concentrating on the delay time of the packet delivery based on time scheduling; they are providing security at the time administrator identifies the delay of packet. The motto of this paper is to provide the security at the initial level while the packet is scheduled so that the attacker cannot do any kind of modification to the packet even though they trace the packet here we are concentrating on the security of the packet. In this paper we are discussing how to secure the packet from the attackers instead of depending on the delay time of the packet and think that the packet is damaged, in the proposed system the duty of the admission controller is to check with the packet and its structure if it is in the correct format the admission controller pushes the packet. 5 3.2 Solution As per the discussions, we are providing security to the packets while the packet is scheduling using BlowFish algorithm. 6 3.2.1 BlowFish Blowfish is a variable-length key block cipher. It does not meet all the requirements for a new cryptographic standard discussed above: it is only suitable for applications where the key does not change often, like a communications link or an automatic file encryptor. It is significantly faster than DES when implemented on 32-bit microprocessors with large data caches, such as the Pentium and the PowerPC. [22] a) Algorithm Blowfish is a variable-length key, 64-bit block cipher. The algorithm consists of two parts: a key-expansion part and a data- encryption part. Key expansion converts a key of at most 448 bits into several sub key arrays totaling 4168 bytes. Data encryption occurs via a 16-round Feistel network. Each round consists of a key-dependent permutation, and a key- and data-dependent substitution. All operations are XORs and additions on 32-bit words. The only additional operations are four indexed array data lookups per round.[22] Sub keys: Blowfish uses a large number of sub keys. These keys must be pre-computed before any data encryption or decryption. 1. The P-array consists of 18 32-bit sub keys: P1, P2,..., P18. 2. There are four 32-bit S-boxes with 256 entries each: S1,0, S1,1,..., S1,255; S2,0, S2,1,..,, S2,255; S3,0, S3,1,..., S3,255; S4,0, S4,1,..,, S4,255. The exact method used to calculate these sub keys will be described later. Encryption: Blowfish is a Feistel network consisting of 16 rounds (see Figure 1). The input is a 64-bit data element, x. Divide x into two 32-bit halves: xL, xR For i = 1 to 16: xL = xL XOR Pi xR = F(xL) XOR xR Swap xL and xR Next i Swap xL and xR (Undo the last swap.) xR = xR XOR P17 32
  • 4. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 xL = xL XOR P18 Recombine xL and xR Function F (see Figure 2): Divide xL into four eight-bit quarters: a, b, c, and d F(xL) = ((S1,a + S2,b mod 232) XOR S3,c) + S4,d mod 232 Decryption is exactly the same as encryption, except that P1, P2,..., P18 are used in the reverse order. Implementations of Blowfish that require the fastest speeds should unroll the loop and ensure that all sub keys are stored in cache. Generating the Subkeys: The sub keys are calculated using the Blowfish algorithm. The exact method is as follows: 1. Initialize first the P-array and then the four S-boxes, in order, with a fixed string. This string consists of the hexadecimal digits of pi (less the initial 3). For example: • P1 = 0x243f6a88 • P2 = 0x85a308d3 • P3 = 0x13198a2e • P4 = 0x03707344 2. XOR P1 with the first 32 bits of the key, XOR P2 with the second 32-bits of the key, and so on for all bits of the key (possibly up to P14). Repeatedly cycle through the key bits until the entire P- array has been XORed with key bits. (For every short key, there is at least one equivalent longer key; for example, if A is a 64-bit key, then AA, AAA, etc., are equivalent keys.) 3. Encrypt the all-zero string with the Blowfish algorithm, using the subkeys described in steps (1) and (2). 4. Replace P1 and P2 with the output of step (3). 5. Encrypt the output of step (3) using the Blowfish algorithm with the modified subkeys. 6. Replace P3 and P4 with the output of step (5). 7. Continue the process, replacing all entries of the P- array, and then all four S-boxes in order, with the output of the continuously-changing Blowfish algorithm. [22] In total, 521 iterations are required to generate all required sub keys. Applications can store the sub keys rather than execute this derivation process multiple times. b) The system model and assumptions In recent studies, a system model is proposed for wireless channel as an NN switch. Although each wireless node may have a single transmitter and a single receiver, it is common that the transmitter and receiver are combined in a transceiver. As such, a node cannot transmit and receive packages simultaneously. In our switch model, there exists a packet scheduler matching transmitters to corresponding receivers. The detailed information regarding the switch model can be found in [21]. In addition to the switch, other three key components in the system include a Security Level Controller (SLC), an Admission Controller (AC), and an EDF (Earliest Deadline First) scheduler as depicted in Fig. 1. This architecture is designed for a link between two nodes in a wireless network. All packets are submitted independently to the wireless link with arrival rates abided by Poisson distribution. The function of the Admission Controller is to determine whether incoming packets can be accepted or not. The Security Level Controller aims at increasing security levels of real-time packets residing in the Accepted queue that can be finished before their deadlines. The EDF scheduler makes use of the Earliest Deadline First policy to schedule admitted packets in which security levels are maximized by the Security Level Controller. c) The packet model Our packet model assumes that all packets have soft deadline and each packet is independent of one another. We also assume that packets’ arrival times follow the classical Poisson distribution. Packet Pi is represented as a tuple (ATi, PTi, SLi, Di), where ATi and PTi denote the arrival time and the processing time of packet i. SLi and Di represent the security level and soft deadline of packet i. Besides, without loss of generality we assume that each packet is assigned a quality of security measured as a security level SLi that in the range [1, 2,….., 10], where 1 and 10 are the lowest and highest levels of security. For example, if packet i has a value of 1 as a security level, this means that the packet has the lowest security level. Although wireless network devices are unable to determine security levels, packets’ security levels can be straightforwardly derived from the security requirements of applications. [1] 33
  • 5. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 To calculate the security overhead without loss of generality, we make use of formula (1) to model the security overhead envisioned as the extra processing time experienced by packet i. SOi = ETi * (SLi/R) (1) where SOi is the security overhead of packet i, SLi is the security level provided to packet i, ETi is the transmission time of the packet. And R is set to 10. Thus, the total processing time WLi of packet i can be expressed as: WLi = ETi + SOi = ETi * (1 + SLi/R) (2) d) The SPSS Algorithm The main goal of this study is to maximize the overall system performance, which reflects the guarantee ratio and security level. To achieve this goal, we designed the SPSS scheduling algorithm with security awareness. SPSS aims to maintain high guarantee ratios while maximizing the security levels. We can accomplish high performance and high security level by applying the Security Level Controller to our SPSS algorithm. Fig. 2 below outlines the flow chart of the security-aware packet-scheduling algorithm (SPSS) for wireless links. The SPSS algorithm strives to maximize the security level of a packet residing in the accepted queue while making the best effort to guarantee its deadline. If the deadline of the packet can be met, the packet will be admitted in the accepted queue. Otherwise, the packet will be dropped and placed in the rejected queue. The following constraint shows whether the packet is equipped to meet its deadline. CTi − STi <= di where STi is the start time of transmission of the ith packet, CTi is the completion time of the transmission, and di is the packet’s deadline. The packets stored in the accepted queue are scheduled depending on their specified deadlines, meaning that the packets with earlier deadlines will be processed first. The SPSS algorithm initializes the security levels of all packets to the minimum levels. Then, SPSS gradually enhances the security level of each packet Pi under the condition that (1) the current packet Pi can be transmitted before its deadline; and (2) the deadlines of the packets being processed later than Pi also can be guaranteed. The above criterion is important and reasonable because if a packet is admitted to the real-time wireless link, then the packet’s timing constraint has to be guaranteed. In other words, the SPSS algorithm ensures that an admitted packet is not adversely affected by subsequently admitted packets. [1] The following steps delineate the procedure of the SPSS scheduling. Step 1: initialize the scheduler; the security values of incoming packets; and the number of rejected packets is set to zero. Wait for any incoming packets. Step 2: if a packet I arrives and it is the only packet available, process the packet immediately using its highest security level. The starting time (STi) and the completion time (CTi) of the packet are calculated. Step 3: All the packets arriving in the scheduler during the time period [STi, CTi] are temporarily stored into a waiting queue in the non-decreasing order of their deadlines. The starting time of the next packet STi + 1 is set to CTi. Step 4: the admission controller is responsible for deciding whether a packet in the waiting queue can be accepted by considering the deadline of this packet. If the packet’s deadline and security requirement can both be guaranteed, the packet will be forwarded into the accepted queue (step 3 and step5). Otherwise, being put into the rejected queue will drop the packet; the number of rejected packets is increased by one. Step 5: the security level controller raises the security levels of all the packets residing in the accepted queue as high as possible. The enhancements of the security levels for real-time packets residing in the accepted queue are subject to the following two constraints: (1) Increasing of an accepted packet’s security level should still guarantee the deadline of the packet. (2) The increase of security levels must not lead to any rejection of currently accepted packet. Step 6: At this point, the security level SLi+1 of the next starting packet is maximized. The packet’s completion time CTi+1 is calculated. Steps 3-6 are repeatedly executed until all the arriving packets are processed in one run. [1] 5. Conclusion Providing security at the time of packet scheduling will help the admission controller to push the packets instead of wasting time by rejecting the packet and providing the level of security to the packet based on the rejection. That being said, securing wireless networks will continue to be a challenge for the foreseeable future. 34
  • 6. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 References [1] Xiao Qin, Mohamed Alghamdi, Mais Nijim, Ziliang Zong, Kiranmai Bellam, Xiaojun Ruan, and Adam Manzanares, “Improving Security of Real-Time Wireless Networks Through Packet Scheduling”, IEEE Transaction on Wireless Communications, Vol. 7, No. 9, September 2008, Page No: 3273-3279. [2] Rong Yu, Zhi Sun, and Shunliang Mei , “Packet Scheduling in Broadband Wireless Networks Using Neuro-Dynamic Programming”, 1550-2252/$25.00 ©2007 IEEE, page No: 2776-2780. [3] Songwu Lu, Vaduvur Bharghavan, R. Srikant, “Fair Scheduling in Wireless Packet Networks”, IEEE/ACM Transactions on Networking, Vol. 7, No. 4, August 1999. Page No: 473-489. [4] Chris Sanders, "Analyzing Wireless Network Security at the packet Level", Articles Misc Network Security, published on Aug 11, 2010. [5] Y. Cao and V. O. K. Li, “Scheduling algorithm in broad-band wireless networks,” in Proc. of the IEEE vol. 89, no. 1, pp. 76-87, Jan. 200l. [6] S. Lu and V. Bharghavan, “Fair scheduling in wireless packet networks,” IEEE/ACM Trans. Networking, vol. 7, no. 4, pp. 473-489, 1999. [7] T. S. Eugene Ng, I. Stoica, and H. Zhang, “Packet fair queueing algorithms for wireless networks with location-dependent errors,” in Proc. INFOCOM98, pp. 1103-1111, Mar. 1998. [8] W. K. Wong, J. Zhu, and V. C. M. Leung, “Soft-QoS provisioning using the token bank fair queueing scheduling algorithm,” IEEE Wireless Communication Magazine, Jun. 2003. [9] T. Karygiannis and L. Owens, “Wireless Network Security 802.11, Bluetooth and Handheld Devices,” chapter 2, http://csrc.nist.gov/publications/nistpubs/ 800-48/NIST SP 800-48.pdf. [10] White paper of Cisco, “Building the mobile business with a unified wireless network http://epsfiles.intermec.com/eps files/eps wp/CISCO SecuringWirelessLAN wpweb.pdf. [11] M. A Badamas, “Mobile computing systems–security considerations,” Information Management and Security 2001, pp. 134–136. [12] V. Gupta and S. Gupta, “Securing the wireless Internet,” IEEE Commun. Mag., pp. 68–74, Dec. 2001. [13] O. M. Karygiannis, Wireless Network Security, NIST special publication 800–48. [14] K. Siau, E. P. Lim, and Z. Shen, “Mobile commerce: promises, challenges and research agenda,” J. Database Management, vol. 12, pp. 4–19, July–Sept. 2001. [15] X. Qin and H. Jiang, “Dynamic, reliability-driven scheduling of parallel real-time jobs in heterogeneous systems,” in Proc. Int’l Conf. on Parallel Processing, pp. 113–122, 2001. [16] X. Qin, H. Jiang, D. R. Swanson, “An efficient fault-tolerant scheduling algorithm for real-time tasks with precedence constraints in heterogeneous systems,” in Proc. Int’l Conf. on Parallel Processing, British Columbia, Canada, pp. 360–368, Aug. 2002. [17] J. C. Palencia and H. M. Gonzalez, “Schedulability analysis for tasks with static and dynamic offsets,” in Proc. 19th IEEE Real-Time Systems Symp. 1998, pp. 26–37. [18] T. F. Abdelzaher and K. G. Shin, “Combined task and message scheduling in distributed real-time systems,” IEEE Trans. Parallel and Distributed Syst., vol. 10, no. 11, Nov. 1999. [19] M. A. Palis, “Online real-time job scheduling with rate of progress guarantees,” in Proc. 6th Int’l Symp. Parallel Architectures, Algorithms, and Networks 2002, pp. 65–70. [20] G. Manimaran and C. S. R. Murthy, “An efficient dynamic scheduling algorithm for multimachine real- time systems,” IEEE Trans. Parallel and Distributed Syst., vol.9, no. 3, pp. 312–319, 1998. [21] S. Al-Harthi and R. Rao, “A switch model for improving throughput and power fairness in Bluetooth piconets,” in Proc. Globecom 2003, pp.1279–1283. [22] B. Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)”, Fast Software Encryption, Cambridge Security Workshop Proceedings (December 1993), Springer-Verlag, 1994, pp. 191-204. N. Paparayudu, is pursing M.Tech in Software Engineering Stream, in the branch of Computer Science, in Aurora’s Engineering College, Bhongir, Andhra Pradesh, India. His areas of interest are Data Engineering, Wireless Networks, and Information Security. Email: rayudu8_n@yahoo.co.in. G.Suresh Kumar, has Masters in Technology and Computer Application , and he has been working as an Associate Professor in Aurora’s Engineering College, Bhongir, Andhra Pradesh, India. His areas of interest are Data Engineering, Wireless Networks, Information Security, and Cloud Computing. Email: suresh.virgo18@gmail.com Srikanth Jatla, working as Associate Professor and Head of the Department of Computer Science and Engineering at Aurora’s Engineering College with a teaching experience of 12years.He is a B.E and M. 35
  • 7. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 Tech in Computer Science and pursuing his PhD in Data Stream Mining at JNTU, Hyderabad. His areas of interest includes data structures, principles of programming languages, algorithm analysis and compiler design, Email: jsrikanth@aurora.ac.in Figure 1. Feistel Cipher Fig 2. The Architecture of Network System 36
  • 8. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 Fig 3. The SPSS Algorithm 37
  • 9. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Chemistry and Materials Research CMR@iiste.org Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Civil and Environmental Research CER@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Food Science and Quality Management FSQM@iiste.org Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing: New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar. Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).