A Comparison for Secured Transmission of Packets in Wireless LAN Using AES and ECC

نویسنده

  • Rajasekar
چکیده

Wireless local area network (WLAN) has increased rapidly, providing flexibility and mobility to the device users. This made the technology popular amongst a wide range of users in the universe. But one of the common problems we are overcoming is fragment loss. So far we were following a scheme to retransmit the entire packet if any fragment is lost. Here we introduce a new scheme called Aggregation with Fragment Retransmission (AFR). In this method, multiple packets are aggregated and transmitted in a single large frame reducing the access overheads and hence increasing the data rate. In addition, to investigate the performance added value when each large frame is fragmented so in the case of error in data frame, only the erroneous fragments are to be retransmitted reducing the error control overheads and this decreases the frame error rate without requiring more overhead. The advanced encryption standard is incorporated into existing aggregation method for 802.11 wireless LANs to achieve secure transmission of frames and compute the maximum throughput, optimal frame, and fragment sizes. The proposed system uses weighted fair scheduling with Advanced Encryption Standard (AES) for obtaining optimal fragment size and also used Elliptical curve cryptography (ECC) instead of AES to show that it will reduce the packet size which will be better than AES. We show that our proposed show increase in average rate of successful message delivery over a communication channel and increase in throughput.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimization of Energy Consumption in Image Transmission in Wireless Sensor Networks (WSNs) using a Hybrid Method

In wireless sensor networks (WSNs)‎, ‎sensor nodes have limited resources with regard to computation‎, ‎storage‎, ‎communication bandwidth‎, ‎and the most important of all‎, ‎energy supply‎. ‎In addition‎, ‎in many applications of sensor networks‎, ‎we need to send images to a sink node‎. ‎Therefore‎, ‎we have to use methods for sending images in which the number and volume of packets are optim...

متن کامل

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

Image Steganography Technique Using Sudoku Puzzle and Ecc Algorithm for Secured Data Transmission

Nowadays, Data transmission is becoming very important among humans. So there are many modes of data transmission introduced. Some of the modes of data transmission are through copper wires, wireless channels, computer buses, etc. Though there are certain modes of transmission, secured data transmission is an important thing what everyone needs, because everyone wants their data to transmit sec...

متن کامل

Design of a Low-Latency Router Based on Virtual Output Queuing and Bypass Channels for Wireless Network-on-Chip

Wireless network-on-chip (WiNoC) is considered as a novel approach for designing future multi-core systems. In WiNoCs, wireless routers (WRs) utilize high-bandwidth wireless links to reduce the transmission delay between the long distance nodes. When the network traffic loads increase, a large number of packets will be sent into the wired and wireless links and can...

متن کامل

A fault tolerance routing protocol considering defined reliability and energy consumption in wireless sensor networks

In wireless sensor networks, optimal consumptionof energy and having maximum life time are important factors. In this article attempt has been made to send the data packets with particular reliability from the beginning based on AODV protocol. In this way two new fields add to the routing packets and during routing and discovering of new routes, the lowest remained energy of nodes and route tra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013