Anomaly Prevention Mechanism for Wireless Networks using the Wireless Node Integrity Assessment Program

Objectives: The wireless network security has been incorporated under this research, which has been implemented based upon the Secure Authentication Algorithm (SeAuL) for the wireless network security. Methods/Statistical Analysis: The multi-level authentication scheme has been proposed for the realization of the security among the wireless networks, which has been called Secure Authentication Algorithm (SeAuL). The proposed model has been designed in the pre-setup phase and post-setup phase for the robust authentication over the wireless networks. Findings: The proposed model has been equipped with the key based encryption using the 16-layered elliptic curve cryptography, which has been found more secure and rapid than the traditional AES algorithm in the various block sizes. The experimental results have proved the efficiency of the proposed model, when assessed on the basis of response delay for the encryption of the keys. Application/ Improvements: The anomaly prevention as well as the denial of service attack prevention has been implemented for the realization of the trusted wireless networks.

[1]  Ashok Koujalagi Bandwidth Estimation For IEEE 802.11 Based Ad Hoc Networks , 2014 .

[2]  Kazi Md. Abdullah Al Mamun,et al.  Wireless Bandwidth estimation technique (WBET) based dynamic channel allocation for IEEE802.11e standard , 2009, 2009 Second International Conference on the Applications of Digital Information and Web Technologies.

[3]  Kirat Pal Singh,et al.  Design of High Performance MIPS Cryptography Processor Based on T-DES Algorithm , 2015, ArXiv.

[4]  Aboul Ella Hassanien,et al.  Key Pre-distribution Techniques for WSN Security Services , 2014, Bio-inspiring Cyber Security and Cloud Services.

[5]  Ali Farrokhtala,et al.  Security in Wireless Sensor Networks: Issues and challanges , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).

[6]  Heh Soon Jung,et al.  Development of a Water-Droplet-Shaped Bra Mold Cup Design , 2016 .

[7]  Rathnakar Acharya,et al.  WLAN QoS Issues and IEEE 802.11e QoS Enhancement , 2010 .

[8]  E. Logashanmugam,et al.  Secure Acknowledgement based Misbehavior Detection in WSN (S-ACK) , 2016 .

[9]  Said Raghay,et al.  New Smart nodes distribution using Kmeans Approach to enhance Routing in WSN , 2016 .

[10]  C. Mala,et al.  Analysis of ECC for application specific WSN security , 2015, 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC).

[11]  Teddy Mantoro,et al.  Improved Modified Reputation-Base Trust for Wireless Sensor Networks Security , 2016 .

[12]  Kwang-il Hwang,et al.  An Efficient Key Management Scheme for Advanced Metering Infrastructure , 2015, CSA/CUTE.

[13]  Sajal K. Das,et al.  A simplistic approach to model capacity estimation and bandwidth utilization of IEEE 802.11e WLAN , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.