This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
8/11/2019 An Improved Algorithm for Designing Secure Point-to-Point Wireless Environment
Abstract — The goal of this paper is to be an easy to follow guide for configuring and securing a wireless
network in a windows environment. Security has been one of the most important issues in wireless
communication. Encryption of messages into cipher text is one of the techniques to provide security up to
some extent but, it also causes another problem, i.e., how to safely and confidentially encrypt and deliversecurity keys so that hackers have to spend a very long time before they can decrypt the cipher text. In this
paper our main aim is to devise a secure point-to-point encryption method for a wireless communication
environment. Novel Diffie-Hellman-based Public Key Distribution System has been implemented, which
adopts a stream cipher technique to encode plaintext with a pseudo random number sequence. We have
verified the proposed method and simulation results show that the performance of this method can meet users’
communication needs. Also it’s a system with high complexity and unpredictability from the consecutive
creation of increasingly positive real value sequences to the final output of random numbers. 98 % of the
random numbers produced passed 60,000 tests determined by Federal Information processing Standards
Publication.
Keywords — Encryption; Diffe-Hellman; Pseudo Random Number Sequence; Secure Point to Point; Sequence
To analyze the system we can create a simulated environment
for a wireless communication and can run the system in using
various channels to generate the cipher text from a plain text
which can be of 512 bits or 1024 bits length. We run the
above proposed system in a simulated system which can be
implemented in java script or any other supporting platform
that provide different environments to run the system for
wireless communication between two parties. Within the
simulator we can run the system in three environments such
as 802.11, High Speed Download Packet Access (3.5) and
WiMax, which are basically acting as three different channels
in wireless communication. The timing of generating and
delivering the key is measured in each environment. Results
found in running the system in each environment are
measured and are shown in Table 1. We found that the time
required in each step or environment to generate the cipher
text is very short. Here we choose the 802.11b which is the
worst one among the three test environments as an example.
The cost spend in steps 1-3 is 0.34 sec, 0.12 sec, 0.34 sec
respectively as shown in table 1.Table 1: Time Required to Generate the Cipher Text in Different
Environments
Step
Env
1
(sec)
2
(sec)
3
(sec)
4
(sec)
802.11b 0.34 0.12 0.34 54
HSDPA 1.7 5.55 0.19 19
WiMax 2.5 0.29 1.28 20
The above results are showing time required to encode
the plain text of some length into cipher text in different
environments in a wireless networks which are very short as
compared to other techniques used in same wireless networks
to encode plain text of same length into cipher text. Thus we
can conclude that the propose system has many benefits. First
the system can be adapted to any wireless networks using
different channels and that originally need to deliver
encrypted keys. Second it spends very less time to generate
cipher text on each key exchange step. At last the proposed
system is very secure since both the keys K and K’ and the
PNRS are generated by parties A and B.
VII. CONCLUSION
The most significant benefits of wireless communication are
mobility and usage convenience, which may be accompanied
with a drawback, i.e., hackers may maliciously intercept thedelivered messages so that how to protect wirelessly
transmitted data is one of the key issues in information
security. In this study, we integrate the Diffie-Hellman
PKDS, RSA and a stream cipher technique to protect Diffie-
Hellman PKDS’s public keys. Further, the cost of the SePem
is not high, but it offers high security level, so it can be
adapted to any wireless network and it takes very short time
to generate cipher text on each key exchange. It is very
suitable mechanism for implementing key management and
delivery in wireless environment. It is very difficult and time
consuming task for hacker to crack DH-PKDS. This security
mechanism is very powerful and safe for transmitting with
authorization between two parties.
REFERENCES
[1] W. Diffie & M. Hellman (1976), ― New Directions inCryptography‖, IEEE Transactions on Information Theory,Vol. 22, No. 6, Pp. 638 – 654.
[2]
R. Rivest, A. Shamir & L. Adleman (1978), ―A Method forObtaining Digital Signatures and Public-Key cryptosystems‖,Communications of the ACM , Vol. 21, No. 2, Pp. 120 – 126.
[3]
T. Elgamal (1985), ―A Public Key Cryptosystem and aSignature Scheme based on Discrete Logarithms‖, Proceedingsof IEEE Transactions on Information Theory, Vol. 31, No. 4,Pp. 469 – 472.
[4] Jong Seon, Golomb,Guang Gong, Hwan-Keun Lee, (1998),―Binary Pseudorandom Sequences of Period 2n-1 with IdealAutocorrelation‖, Proceedings of IEEE Transactions on Information Theory, Vol. 44, No. 2, Pp. 814 – 817.
[5] Andrea Golsmith (2004), ―Wireless Communication‖, Pp.1 – 7.[6] IEEE (2004), ―IEEE Standard for Local and Metropolitan Area
Networks part 16: Air Interface for Fixed Broadband WirelessAccess Systems IEEE std 802.16-2004‖,http://standards.ieee.org/findstds/standard/802.16-2004.html.
[7] M. Barbeau (2005), ―WiMax/802.16 Threat Analysis‖, Proceedings of the 1st ACM International Workshop onQuality of Service & Security in Wireless and Mobile Networks, Montreal, Canada, Pp. 8 – 15.
G.A. Safdar, C. McGrath C & M. McLoone (2006), ―ExistingWireless Network Security Mechanisms and their Limitationsfor Ad Hoc Networks‖, Proceedings of Irish Signals and
Systems, Dublin, Pp. 197 – 202.[10]
M. Shin, J. Ma, A. Mishra & W. Arbaugh (2006), ―Wireless Network Security and Internetworking‖, Proceedings of the IEEE , Vol. 94, No. 2, Pp. 455 – 466.
[11]
Y. Xiao, H.-H. Chen, X. Du & M. Guizani (2009), ―Stream- based Cipher Feedback Mode in Wireless Error Channel‖, IEEE Transactions on Wireless Communications, Vol. 8, No. 2,Pp. 622 – 626.
[12] Y.-F. Huang, C.-H. Lin & K.-L. Wen (2009), ―A Pseudo-Random Number Generator based on Grey System Theory‖, Far East Journal of Mathematical Sciences, Vol. 35, No. 1, Pp.1 – 17.
[13] G. Steven Galbr & R.S. Ruprai (2009), ―An Improvement tothe Gaudry-Schost Algorithm for Multidimensional DiscreteLogarithm Problems‖, Proceedings of the 12th IMA International Conference on Cryptography and Coding , Pp.
Authentication with Dynamic Keys in an IEEE802.16e PKM
Environment without Prior Authentication Connection‖, Proceedings of the 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, Washington, USA, Pp. 441 – 446.
[15]
Y.-F. Huang, F.-Y. Leu, C.-H. Chiu & I.-L. Lin (2011),
―Improving Security Levels of IEEE802.16e Authentication byInvolving Diffie-Hellman PKDS‖, Journal of UniversalComputer Science, Vol. 17, No. 6, Pp. 891 – 911.
8/11/2019 An Improved Algorithm for Designing Secure Point-to-Point Wireless Environment
Jagpreet Singh did his Graduation fromPunjab Technical University, Kapurthala in2009 and perusing his M.Tech in InformationTechnology at Guru Nanak Dev EngineeringCollege, Ludhaiana , India from Punjab
Technical University, Kapurthala. He isassociated with MNC Accenture asApplication Support Specialist. His job profile is Incident Management and deal with
Desktop, Application, Server, and Network related issues. Hisresearch interest is in the fields of Network Security, Wan and LanTechnologies. He has presented many papers in different seminarsand conferences His research papers have been published in various
national and international journals.
Vivek Thapar did his graduation fromPunjab Technical University, Kapurthala
and Post Graduation from Punjabi
University with 72%. He is involved inresearch since last four years. His
research paper has been published in
many national and internationals
journals. He has presented many papers
in different seminars and conferences. Currently he isinvolved in developing novel software for different statistical
methods and presently working as Asst. Prof in Computer
Science and Engineering at Guru Nanak Dev Engineering
College, Ludhiana, India. His area of Specialization is
Network Security and Web Technologies. He is currently
doing PhD from Punjab Technical University.
Anshu Aneja did his Graduation from
Punjab Technical University, Kapurthala
in 2003 and has completed his M.Tech in
Information Technology at Guru NanakDev Engineering College, Ludhaiana ,
India from Punjab Technical University,Kapurthala. His research interest is in the
fields of Network Security, Wan
Technologies, Internetworking, and Routing Protocols. Hehas presented many papers in different seminars and
conferences His research papers have been published in