Open Access Open Access  Restricted Access Subscription or Fee Access

Design and Study of Scanning Technique Based Security Algorithm and It’s Applicability in Wireless Communication

G. A. Sathishkumar, Dr. K. Boopathy bagan, P. Muthu kannan, Dr .V. Palanisamy, P. Muthukumaran

Abstract


In today’s modern world, wireless technologies have become increasingly popular in our everyday business and personal lives. Personal digital assistants (PDA) allow individuals to access calendars, e-mail, phone number lists, address and the Internet. Some Vendors even provide global positioning system (GPS) capabilities that can pinpoint the location of the device anywhere in the world. In the coming years wireless technologies promise to offer even more features and functions for the future generation. An increasing number of government agencies, businesses, and home users are using, wireless technologies in their environments. An important point here is agencies should be aware of the security risks associated with wireless technologies. Agencies need to develop strategies that will mitigate risks as they integrate wireless technologies into their computing environments. This paper discusses a simple TV scanning technique based on MISO system for wireless communication technologies, outlines the associated antenna design, and offers good resistance to the vulnerabilities in the channel.


Keywords


MISO, Scanning, PN sequence, BBS generator, Antenna, Interlaced Scanning, Encryption, FFT, CGSN, SGSN.

Full Text:

PDF

References


Hao Yang, Fabio Ricciato, Songwu Lu and Lixi Zhang,” Securing a Wireless World”, Proceeding of the IEEE, VOL94, NO.2, February 2006.

T.S.Rappaport, “Wirless Communications”, PHI, 2nd edition, 2002.

Tom Karygiannis and Les Owens,” Wireless Network Security 802.11, Bluetooth and Handheld Devices”, NIST technology administration, US department of commerce.

Wireless LAN Security802.11b and Corporate networks, An ISS technical White paper.

C.A.Balanis, “Antenna Theory: Analysis and design”, 2nd Edition, John Wiley, 2004

Choonghun Lee and Hyunsu Chae,” Enhanced Authentication Protocol for Wibro Networks”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.9, September 2008

Min-kyu Choi1, Rosslin John Robles1, Chang-hwa Hong, Tai-hoon Kim1,” Wireless Network Security:Vulnerabilities, Threats and Countermeasures”, International Journal of Multimedia and Ubiquitous Engineering Vol. 3, No. 3, July, 2008

Ashwani Kush & Ram Kumar,”Wireless Network Security Issues”,DESIDOC Bulletin of Information Technology , Vol. 25, No.1, January 2005, pp. 13-18 2005, DESIDOC

Joseph Kabara, Prashant Krishnamurthy, David Tipper,” Information Assurance in Wireless Networks”, ISW-2001/2002Fourth Information Survivability Workshop (ISW-2001/2002)"Impediments to Achieving Survivable Systems"CERT,Vancover,Canada.

Yuan Zhou1, Chunhe Xia1, Haiquan Wang1, Jianzhong Qi1,”Research on Survivability of Mobile Ad-hoc Network”, J. Software Engineering & Applications, 2009, 2:50-54

Arbaugh, W.A. Shankar, N. Wan, Y.C.J. Kan Zhang,” Your 80211 wireless network has no clothes”, IEEE Wireless Communications,December 2002.

Fayssal, S.; Hariri, S.; Al-Nashif, Y.” Anomaly-Based Behavior Analysis of Wireless Network Security”, IEEE conference on Mobile and Ubiquitous systems, 2007.

Tim Chenoweth, Robert Minch, Sharon Tabor,” User Security Behavior on Wireless Networks: An Empirical Study”, IEEE Conference on System Sciences, 2007.

Mudhakar Srivatsa,”Who is listening? Security in Wireless Networks”,IEEE Int. Conf. on Signal Processing, Communication and Networking,2008.

H. Kim and J. D. Villasenor, “Secure MIMO communications in a system with equal numbers of transmit and receive antennas,” IEEE Communications Letters, vol. 12, no. 5, pp. 386–388, May 2008.

M.A.Haleem, C.N.Mathur, R.Chandramouli, K.P.Subbalakshmi,“Opportunistic encryption: A Trade-off between Security and Throughput in Wireless Netowrks”, IEEE Transactions on Dependable and Secure Computing, Vol. 4, No.4, October 2007.

S.K.Dhurandher, S.Mishra, S. Ahlawat, Nitesh Gupta and Neelesh Gupta,” E2 SCAN: An Extended Credit Strategy-based Energy-efficient Security Scheme for Wireless Networks”, IET Communications Journal,May 2008.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.