A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Arockiam, L.
- Security Issues in Mobile Communication with MIPv6: A Survey
Authors
1 Computer science at St.Joseph's College (Autonomous), Tiruchirappalli, Tamilnadu, IN
2 Computer Science at St.Joseph's College (Autonomous), Tiruchirappalli, Tamilnadu, IN
Source
Wireless Communication, Vol 2, No 11 (2010), Pagination: 419-424Abstract
Achieving secured mobile communication is the most important job nowadays, while mobile communication becomes an essential part of human life. Special features like Route Optimization and enhanced address formats make the Mobile IPv6 very famous and a dominant part in the mobile communication area. There are so many advanced features available in Mobile IPv6. When the number of users increases, simultaneously new security threats also appear. Introduction of Route Optimization increases the performance of the communication by avoiding triangular routing which is available in former version of Mobile IP (i.e. MIPv4) at the same time it introduces new security threats also. Route Optimization follows a new route which may not be familiar for the nodes. The nodes may be at any area of the Internet and they may have not previous relationship among them. Securing this kind of route and the packet transfer is more critical. Many researchers found solutions for securing the Mobile IPv6 communications. But unfortunately, they have some drawbacks which cannot provide 100% security. In this paper, many security threats and solutions given by various researchers are analyzed.Keywords
IPSec, Mobile IPv6, RRP, Security.- A Performance Analysis of WEP and WPA2 Protocols to Ensure WLAN Security
Authors
1 Department of Computer Science & Engineering, Bharathidasan University, Trichy-23, IN
2 Department of Computer Science, St. Joseph’s College, Trichy -2, IN
Source
Wireless Communication, Vol 2, No 3 (2010), Pagination: 86-92Abstract
Security is the major issue among the WLAN user community since users are comfortable with the mobility and portability of the mobile devices. The ease of use makes them to concentrate on the minimum security measures like a basic authentication with a periodic change of passwords. On the other side of these technological benefits, there is always a hidden chance of intrusions on the personal and business data. The data authentication, authorization, data integrity and confidentiality are the most used specifications for securing the wireless network. So the ultimate solution is to protect the data from all types of attack and losses. For this the user must know the types of attacks and the prevention methods. This paper analyzes the two security protocols namely RC4 and AES, which are used in WEP and WPA2 respectively. The purpose of this paper is to give developers with little or no knowledge of cryptography the ability to understand the encryption and decryption techniques used in RC4, AES algorithms and also a comparative performance analysis methodology.
Keywords
Authentication, AES, Wireless Security, WEP, WPA, 802.1x.- Reliability Analysis for General Packet Radio Service with Quality of Service Support
Authors
1 Computer Science at Bishop Heber College (Autonomous), Tiruchirappalli, Tamil Nadu, IN
2 Computer Science at St.Joseph's College (Autonomous), Tiruchirappalli, Tamil Nadu, IN
Source
Wireless Communication, Vol 1, No 2 (2009), Pagination: 79-83Abstract
Many of today’s applications have not been designed to be used in mobile environments. In order to build mobility in these applications there is a need to compromise in higher delay, higher error rate, and lower bandwidth. The customers not only need mobility but also quality. It is a great challenge for the service providers to offer Quality of Service (QoS). The QoS parameters are divided into two categories such as Qualitative QoS parameters (reliability,security,manageability, etc.) and Quantitative QoS parameters (bandwidth,delay, jitter, etc). The requirements of the above parameters will vary from one application to another application. In this paper, we would like to propose a QoS technique to store the actual QoS requirements of data transfer and to evaluate the performance of data transfer with respect to reliability. Certainly, the outcome of this paper will help to compare the expected QoS requirements with the actual QoS requirements, to understand performance degradation and to identify the parameters responsible for reliability problem.