Enhancing the Security and Reliability for Data Transmission in Wireless Networks

نویسندگان

  • N. Karpagam
  • S. Nithya
چکیده

Microwave Access (WiMAX) and Long-Term Evolution (LTE) are considered the best technologies for vehicular networks. WiMAX and LTE are Fourth-Generation (4G) wireless technologies that have well-defined quality of service (QoS) and security architectures.Existing work QoS-aware distributed security architecture using the elliptic curve Diffie– Hellman (ECDH) protocol that has proven security strength and low overhead for 4G wireless networks.The proposed distributed security architecture using the ECDH key exchange protocol.ECDH can establish a shared secret over an insecure channel at the highest security strength.Limitations of high computational and communication overhead in addition to lack of scalability.so that the proposed work propose an unconditionally secure and efficient SAMA. The main idea is that for each message m to be released, the message sender, or the sending node, generates a source anonymous message authenticator for the message m.The generation is based on the MES scheme on elliptic curves. For a ring signature, each ring member is required to compute a forgery signature for all other members in the AS. IMS (IP Multimedia Subsystem) is a set of specifications to offer multimedia services through IP protocol. These make it possible to include all kinds of services, such as voice, multimedia and information, on reachable platform through any Internet link. A multi-attribute stereo model for IMS security analysis based on ITU-T Recommendation X.805 and STRIDE threat model, which provide a comprehensive and systematic standpoint of IMS. Femtocell access points (H(e)NBs) are close-range, limited-capacity base stations that use residential broadband connections to connect to carrier networks. Final conclution to provide hop-by-hop message Authentication without the weakness of the built in threshold of the polynomial-based scheme, then proposed a hop-by-hop message authentication scheme based on the SAMA. Key wordsLong-Term Evolution (LTE), Multi Hop, Worldwide Interoperable For Microwave Access (Wimax), Elliptic Curve Diffie Hellman (ECDH).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Quasi Random Deployment Strategy for Reliable Communication Backbones in Wireless Sensor Networks

Topology construction and topology maintenance are significant sub-problems of topology control. Spanning tree based algorithms for topology control are basically transmission range based type construction algorithms. The construction of an effective backbone, however, is indirectly related to the placement of nodes. Also, the dependence of network reliability on the communication path undertak...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

Optimization of Energy Consumption in Image Transmission in Wireless Sensor Networks (WSNs) using a Hybrid Method

In wireless sensor networks (WSNs)‎, ‎sensor nodes have limited resources with regard to computation‎, ‎storage‎, ‎communication bandwidth‎, ‎and the most important of all‎, ‎energy supply‎. ‎In addition‎, ‎in many applications of sensor networks‎, ‎we need to send images to a sink node‎. ‎Therefore‎, ‎we have to use methods for sending images in which the number and volume of packets are optim...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

A fault tolerance routing protocol considering defined reliability and energy consumption in wireless sensor networks

In wireless sensor networks, optimal consumptionof energy and having maximum life time are important factors. In this article attempt has been made to send the data packets with particular reliability from the beginning based on AODV protocol. In this way two new fields add to the routing packets and during routing and discovering of new routes, the lowest remained energy of nodes and route tra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015