Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 30 Providing Security to Wireless Packet Networks by using Optimized Security Method N. Paparayudu * G. Suresh Kumar J.Srikanth Aurora’s Engineering College, Raigir, Bhongir, Nalgonda Dist, Andhra Pradesh, India. * E-mail of the corresponding author: rayudu8_n@yahoo.co.in Abstract Now-a-days technology is growing very fast, due to rapid development of the technology in computer arena, communication through network become a habit to the users. Communication through network is happen using two channels i.e., by connection oriented and connection less. At present users prefer wireless networks for communication and transferring data due to its flexibility. So in this paper we are focusing on wireless networking, as it is not reliable we are proposing an optimized security technique to provide security to the communication on wireless. In this paper we mainly focus on packet scheduling which plays the vital role in the transmission of data over wireless networks. We are using optimized security technique to secure the packets at initial level itself while scheduling the packets. Keywords: Real-Time Packets, Packet Scheduling, Wireless Networks, Security, Cryptography, Secret key, Bandwidth. 1. Introduction The quirky thing about a wireless network is that you cannot always see what you are dealing with. In a wireless network, establishing connectivity is not a simple task like plugging in a cable, providing physical security is not easy by keeping unauthorized individuals out of a facility, and troubleshooting even trivial, issues can sometimes result in a few expletives being thrown in the general direction of an access point. [4] It should be noted that supporting efficient and reliable data transmission, especially real time data transmission, over wireless networks is extremely difficult and challenging because wireless networks must be facing more complicated environments compared with conventional wired networks. For instance, wireless networks could be disturbed by radio wave and thunderstorms or blocked by physical objects like mountains or skyscrapers. Even worse, high mobility coupled with a variety of explosively increased users makes existing security policies in wireless networks inefficient or even useless, meaning that wireless networks can be easily attacked by computer viruses, worms, spy wares, and similar threats. These security threats cause downtime or continual patching in wireless networks and thus lead to severe disruption in wireless commercial business. Therefore, boosting security of wireless networks has become one of the most important issues in the arena of wireless communications. [1] With the rapid growth of needs for wireless multimedia applications and wireless data services, it is expected that the future broadband wireless networks will support the transmission of heterogeneous classes of traffic (e.g., realtime and non-realtime traffic flows). The design of broadband wireless networks introduces a set of challenging technical issues. Among all these issues that need to be resolved, packet scheduling problem is one of the most important. It is well known that, the bandwidth resource of wireless networks is very scarce. Scheduling algorithms, which are in charge of the bandwidth allocation and multiplexing, have major influence on the network performance. [2] However, in packet cellular environments, user mobility and wireless channel error make it very difficult to perform either resource reservation or fair packet scheduling. While there have been some recent efforts to provide resource reservation for mobile flows in packet cellular networks, the problem of fair packet scheduling in wireless networks has remained largely unaddressed. In fact, even the notion of fairness in shared channel wireless networks has not been precisely defined. [3] At the packet level wireless networks are similar to wired networks in most ways. Wireless networks still use TCP/IP for data communication and abide by all of the same laws of networking as wired hosts. The major difference between the two networking platforms is found at the lower layers of the OSI model.