Abstract
Addressing plays vital role in the communication of wired and wireless network. We proposed masking of internet protocol (IP) address by using the image abstraction of the mobile user. Every image is with independent Gray scale values varying from image to image. User defined mask for image generates address providing authenticity to each user in the network. We simulated the 32-bit address generated from an image and inserted and tested through real world deployment using Matlab Simulink environment. This will provide secured addressing mechanism and will be used as a unique identity to access a network.















Similar content being viewed by others
References
Brahima, S. (2015). The world in 2015—ICT Facts and Figures. International Telecommunication Union.
Abusubaih, M. (2012). Mutual interference between Bluetooth and 802.11n MIMO devices. In 19h international conference on telecommunications (ICT) (pp. 1–5). Jounieh.
Das, S., et al. (2009). IEEE 802.21: Media independent handover: Features, applicability, and realization. IEEE Communications Magazine, 47(1), 112–120.
Moon, B. (2014). Fast and secure session mobility in IMS-based vertical handover scenario. International Journal of Multimedia and Ubiquitous, Engineering, 9(9), 171–188.
Hsu, A. C. C., Wei, D. S., & Kuo, C. C. J. (2015). Coexistence wi-fi MAC design for mitigating interference caused by collocated bluetooth. IEEE Transactions on Computers, 64(2), 342–352.
Ernst, J. B., Nasser, N., & Rodrigues J. (2012). Co-channel interference modelling between RATs in heterogeneous wireless networks. In IEEE international of conference on communications (ICC) (pp. 5321–5325). Ottawa, ON.
Bian, V., & Park J.-M. J. (2012). Ecology-inspired coexistence of heterogeneous wireless networks. In IEEE global communications conference (GLOBECOM) (pp. 4921–4926). Atlanta, GA.
Mach, P., Becvar, Z., & Vanek, T. (2012). In-band device-to-device communication in OFDMA cellular networks: A survey and challenges. IEEE Communications Surveys and Tutorials, 17(4), 1885–1922.
Krishna, B. M., & Tamma, B. R. (2012). An enhanced media independent handover framework for heterogeneous wireless networks. In 12th international conference on intelligent systems design and applications (ISDA) (pp. 610–615). Kochi.
Puttonen, J., Fekete, G., Makela, J., Hamalainen, T., & Narikka, J. (2005). Using link layer information for improving vertical handovers. In Pers. Indoor Mob. Radio Commun. PIMRC. IEEE 16th Int. Symp. (pp. 1747–1752). Berlin
Singh, R. K., Asthana, A., & Balyan, A. (2012). Vertical handoffs in fourth generation wireless networks. International Journal of Soft Computing and Engineering, 2, 481–490.
RFC 791. Internet protocol, 1981.
MATLAB and Statistics Toolbox Release (2014). The MathWorks, Inc., Natick, Massachusetts, United States.
Gonzalez, R. C., & Woods, R. E. (2002). Digital image processing. Pearson Education, 3, 112–115.
Bellens, R., Douterloigne, K., Gautama, S., & Philips, W. (2008). Per pixel contextual information for classification of VHR images of urban areas. International Geoscience and Remote Sensing Symposium, 4(1), 522–525.
Himayat, N., Yeh, S., Ali Panah, Y., & Talwar, S. (2014). Multi-radio heterogeneous networks: Architectures and performance. In International conference on computing, networking and communications (pp. 252–257). Honolulu.
Salwe, S. S., & Naik, K. K. (2017). Discrete image data transmission in heterogeneous wireless network using vertical handover mechanism. IET Image Processing, 11(7), 550–558.
Salwe, S. S., & Naik, K. K. (2016). Advanced heterogeneous wireless communication technique using vertical handover scenario. In IEEE international conference on next generation intelligent systems (ICNGIS) (pp. 1–5). Kottayam.
Stuedi, P., & Alonso, G. (2005). Transparent heterogeneous mobile ad hoc networks. In 2nd annual international conference on mobile and ubiquitous systems: Networks and services (pp. 237–246). San Diego.
Schmidt, R. D. O., Gomes, R., Sadok, D., Kelner, J., & Johnsson, M. (2009). An autonomous addressing mechanism as support for auto-configuration in dynamic networks. In Network operations and management symposium (pp. 1–12). Punta Del Este: LANOMS Latin American.
Vidales, P., et al. (2004). Experiences with heterogeneous wireless networks, unveiling the challenges. In Proceedings of 2nd international working conference on performance modeling and evaluation of heterogeneous networks.
Lin, C. R., Wang, G. M., & Dad, A. W. (2005). A duplicate address resolution protocol in mobile ad hoc networks. IEEE Journal of Communication and Network, 7(4), 525–536.
Leng, C. K. (2008). JPEG image steganalysis improvement via image-to-image variation minimization. In International conference on advanced computer theory and engineering ICACTE (pp. 223–227). Fuket.
Ghosh, U., & Datta, R. (2015). A secure addressing scheme for large-scale managed MANETs. IEEE Transactions on Network and Service Management, 12(3), 483–495.
Acknowledgements
This work is being carried out in Communication Laboratory, Electronics Engineering Department, Defence Institute of Advance Technology Pune. The authors thank anonymous reviewers for their valuable comments and constructive suggestions. The authors also thank Mr. Ajit Singh, Mr. Sathish Nayak from communication laboratory in Electronics Engineering for their help in statistical analysis and necessary corrections. This work was supported by the Defence Institute of Advanced Technology, Pune.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Salwe, S.S., Naik, K.K. Wireless Network Security Based on the Image Address Masking (IAM) Mechanism. Wireless Pers Commun 101, 23–40 (2018). https://doi.org/10.1007/s11277-018-5664-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-5664-y