6 research outputs found
A Physical Layer Secured Key Distribution Technique for IEEE 802.11g Wireless Networks
Key distribution and renewing in wireless local area networks is a crucial
issue to guarantee that unauthorized users are prevented from accessing the
network. In this paper, we propose a technique for allowing an automatic
bootstrap and periodic renewing of the network key by exploiting physical layer
security principles, that is, the inherent differences among transmission
channels. The proposed technique is based on scrambling of groups of
consecutive packets and does not need the use of an initial authentication nor
automatic repeat request protocols. We present a modification of the scrambling
circuits included in the IEEE 802.11g standard which allows for a suitable
error propagation at the unauthorized receiver, thus achieving physical layer
security.Comment: 9 pages, 7 figures. Accepted for publication in IEEE Wireless
Communications Letters. Copyright transferred to IEE
A Security Solution for Wireless Local Area Network (WLAN) Using Firewall and VPN
In the era of internet millions of users share resource for different purpose. The chances of security risks are more when a user connected with internet. Internet technology plays an important role in every aspect of human life. We can create virtual connectivity with-in seconds with anyone in the world and can exchange or share the information through internet. Sometimes these information is very useful for Defense, and personal use. Sometimes this information is stolen on the internet or we can say destroyed so that receiver cannot receive that information, so for successful communication on internet our connection should be protected. For this protection we can use Firewall protection, VPN Network. These Networks is much more protected than normal Network. Network with VPN and Firewall is faster and efficient rather than normal connection. In normal Network user may faces unexpected delay due to malware and virus. In this paper we have described and analyze impact of Virtual Private Network technology and firewall with normal network. We have simulated three scenarios without firewall, with firewall and Firewall_VPN. The simulation results of three scenarios are compared over WLAN and analyze the impact of Firewall and VPN on network performance. OPNET 14.5 is used for simulator work. Keywords: VPN, Firewall, Security, WLAN, OPNET 14.5
Practical LDPC coded modulation schemes for the fading broadcast channel with confidential messages
The broadcast channel with confidential messages is a well studied scenario
from the theoretical standpoint, but there is still lack of practical schemes
able to achieve some fixed level of reliability and security over such a
channel. In this paper, we consider a quasi-static fading channel in which both
public and private messages must be sent from the transmitter to the receivers,
and we aim at designing suitable coding and modulation schemes to achieve such
a target. For this purpose, we adopt the error rate as a metric, by considering
that reliability (security) is achieved when a sufficiently low (high) error
rate is experienced at the receiving side. We show that some conditions exist
on the system feasibility, and that some outage probability must be tolerated
to cope with the fading nature of the channel. The proposed solution exploits
low-density parity-check codes with unequal error protection, which are able to
guarantee two different levels of protection against noise for the public and
the private information, in conjunction with different modulation schemes for
the public and the private message bits.Comment: 6 pages, 4 figures, to be presented at IEEE ICC'14 - Workshop on
Wireless Physical Layer Securit
A physical layer secured key distribution technique for IEEE 802.11g wireless networks
Key distribution and renewing in wireless local area
networks is a crucial issue to guarantee that unauthorized users
are prevented from accessing the network. In this paper, we
propose a technique for allowing an automatic bootstrap and
periodic renewing of the network key by exploiting physical
layer security principles, that is, the inherent differences among
transmission channels. The proposed technique is based on
scrambling of groups of consecutive packets and does not need
the use of an initial authentication nor automatic repeat request
protocols. We present a modification of the scrambling circuits
included in the IEEE 802.11g standard which allows for a suitable
error propagation at the unauthorized receiver, thus achieving
physical layer security