[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Wireless Network Security Based on the Image Address Masking (IAM) Mechanism

Published: 01 July 2018 Publication History

Abstract

Addressing plays vital role in the communication of wired and wireless network. We proposed masking of internet protocol (IP) address by using the image abstraction of the mobile user. Every image is with independent Gray scale values varying from image to image. User defined mask for image generates address providing authenticity to each user in the network. We simulated the 32-bit address generated from an image and inserted and tested through real world deployment using Matlab Simulink environment. This will provide secured addressing mechanism and will be used as a unique identity to access a network.

References

[1]
Brahima, S. (2015). The world in 2015--ICT Facts and Figures. International Telecommunication Union.
[2]
Abusubaih, M. (2012). Mutual interference between Bluetooth and 802.11n MIMO devices. In 19h international conference on telecommunications (ICT) (pp. 1---5). Jounieh.
[3]
Das, S., et al. (2009). IEEE 802.21: Media independent handover: Features, applicability, and realization. IEEE Communications Magazine, 47(1), 112---120.
[4]
Moon, B. (2014). Fast and secure session mobility in IMS-based vertical handover scenario. International Journal of Multimedia and Ubiquitous, Engineering, 9(9), 171---188.
[5]
Hsu, A. C. C., Wei, D. S., & Kuo, C. C. J. (2015). Coexistence wi-fi MAC design for mitigating interference caused by collocated bluetooth. IEEE Transactions on Computers, 64(2), 342---352.
[6]
Ernst, J. B., Nasser, N., & Rodrigues J. (2012). Co-channel interference modelling between RATs in heterogeneous wireless networks. In IEEE international of conference on communications (ICC) (pp. 5321---5325). Ottawa, ON.
[7]
Bian, V., & Park J.-M. J. (2012). Ecology-inspired coexistence of heterogeneous wireless networks. In IEEE global communications conference (GLOBECOM) (pp. 4921---4926). Atlanta, GA.
[8]
Mach, P., Becvar, Z., & Vanek, T. (2012). In-band device-to-device communication in OFDMA cellular networks: A survey and challenges. IEEE Communications Surveys and Tutorials, 17(4), 1885---1922.
[9]
Krishna, B. M., & Tamma, B. R. (2012). An enhanced media independent handover framework for heterogeneous wireless networks. In 12th international conference on intelligent systems design and applications (ISDA) (pp. 610---615). Kochi.
[10]
Puttonen, J., Fekete, G., Makela, J., Hamalainen, T., & Narikka, J. (2005). Using link layer information for improving vertical handovers. In Pers. Indoor Mob. Radio Commun. PIMRC. IEEE 16th Int. Symp. (pp. 1747---1752). Berlin
[11]
Singh, R. K., Asthana, A., & Balyan, A. (2012). Vertical handoffs in fourth generation wireless networks. International Journal of Soft Computing and Engineering, 2, 481---490.
[12]
RFC 791. Internet protocol, 1981.
[13]
MATLAB and Statistics Toolbox Release (2014). The MathWorks, Inc., Natick, Massachusetts, United States.
[14]
http://in.mathworks.com/help/matlab/ref/rgb2Gray.html.
[15]
Gonzalez, R. C., & Woods, R. E. (2002). Digital image processing. Pearson Education, 3, 112---115.
[16]
Bellens, R., Douterloigne, K., Gautama, S., & Philips, W. (2008). Per pixel contextual information for classification of VHR images of urban areas. International Geoscience and Remote Sensing Symposium, 4(1), 522---525.
[17]
Himayat, N., Yeh, S., Ali Panah, Y., & Talwar, S. (2014). Multi-radio heterogeneous networks: Architectures and performance. In International conference on computing, networking and communications (pp. 252---257). Honolulu.
[18]
Salwe, S. S., & Naik, K. K. (2017). Discrete image data transmission in heterogeneous wireless network using vertical handover mechanism. IET Image Processing, 11(7), 550---558.
[19]
Salwe, S. S., & Naik, K. K. (2016). Advanced heterogeneous wireless communication technique using vertical handover scenario. In IEEE international conference on next generation intelligent systems (ICNGIS) (pp. 1---5). Kottayam.
[20]
Stuedi, P., & Alonso, G. (2005). Transparent heterogeneous mobile ad hoc networks. In 2nd annual international conference on mobile and ubiquitous systems: Networks and services (pp. 237---246). San Diego.
[21]
Schmidt, R. D. O., Gomes, R., Sadok, D., Kelner, J., & Johnsson, M. (2009). An autonomous addressing mechanism as support for auto-configuration in dynamic networks. In Network operations and management symposium (pp. 1---12). Punta Del Este: LANOMS Latin American.
[22]
Vidales, P., et al. (2004). Experiences with heterogeneous wireless networks, unveiling the challenges. In Proceedings of 2nd international working conference on performance modeling and evaluation of heterogeneous networks.
[23]
Lin, C. R., Wang, G. M., & Dad, A. W. (2005). A duplicate address resolution protocol in mobile ad hoc networks. IEEE Journal of Communication and Network, 7(4), 525---536.
[24]
Leng, C. K. (2008). JPEG image steganalysis improvement via image-to-image variation minimization. In International conference on advanced computer theory and engineering ICACTE (pp. 223---227). Fuket.
[25]
Ghosh, U., & Datta, R. (2015). A secure addressing scheme for large-scale managed MANETs. IEEE Transactions on Network and Service Management, 12(3), 483---495.

Cited By

View all
  • (2020)An Attack Resilient Framework in Cognitive Radio Network Environment for Inter-domain and Intra-domain CommunicationWireless Personal Communications: An International Journal10.1007/s11277-020-07541-6114:4(3457-3475)Online publication date: 6-Jun-2020
  1. Wireless Network Security Based on the Image Address Masking (IAM) Mechanism

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Wireless Personal Communications: An International Journal
    Wireless Personal Communications: An International Journal  Volume 101, Issue 1
    July 2018
    583 pages

    Publisher

    Kluwer Academic Publishers

    United States

    Publication History

    Published: 01 July 2018

    Author Tags

    1. Addressing
    2. Coexistence
    3. Heterogeneous
    4. Vertical handover
    5. Wireless communication

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 06 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)An Attack Resilient Framework in Cognitive Radio Network Environment for Inter-domain and Intra-domain CommunicationWireless Personal Communications: An International Journal10.1007/s11277-020-07541-6114:4(3457-3475)Online publication date: 6-Jun-2020

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media