Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Service Package Identifier Based Security Verification Algorithm For Wireless Mobile AD-HOC Network


Affiliations
1 Department of Electronics and Communication Engineering, Hindustan College of Engineering and Technology, India
2 Department of Computer Science and Engineering, IES College of Engineering, India
     

   Subscribe/Renew Journal


In general, the biggest problem with a mobile ad-hoc network is the threat to its security. This is because the mobile ad-hoc network is dismantled after a certain period of time, which spends a lot of time calculating its stability and greatly wastes its security dimensions. Thus, the security features on these temporary networks need to be strengthened as they pose the most threats. In this paper, a security algorithm designed in SID mode is proposed to fix security vulnerabilities in the wireless mobile ad-hoc network module. Its main feature is that its security definitions are defined according to the number of Service Package Identification assigned to it. The definition of numbers based on its importance is to make a list of related devices in order and, accordingly, bring those devices into the security module. Its security features have been improved so that the security modules remain active as long as the network is active.

Keywords

Service Package Identification, Ad-hoc Networks, MANET, Security, Stability
Subscription Login to verify subscription
User
Notifications
Font Size

  • S. Kannan, G. Dhiman, and M. Gheisari, “Ubiquitous Vehicular Ad-Hoc Network Computing using Deep Neural Network with IoT-Based Bat Agents for Traffic Management”, Electronics, Vol. 10, no. 7, pp. 785-796, 2021.
  • M.E. Ahmed and H. Kim, “DDoS Attack Mitigation in Internet of Things Using Software Defined Networking”, Proceedings of International Conference on Big Data Computing Service and Applications, pp. 6-9, 2017.
  • S. Banerjee and S. Khuller, “A Clustering Scheme for Hierarchical Control in Multi-Hop Wireless Networks”, Proceedings of IEEE International Conference on Computer and Communications Societies, pp. 102801037, 2001.
  • L. Atzori and A. Iera, “The Internet of Things: A Survey”, Computer Networks, Vol. 54, No. 15, pp. 2787-2805, 2010.
  • M.U. Bokhari, H.S.A. Hamatta and S.T. Siddigui, “A Review of Clustering Algorithms as Applied in MANETs”, International Journal Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 11, pp. 364369, 2012.
  • R. Agarwal and M. Motwani, “Survey of Clustering Algorithms for MANET”, International Journal on Computer Science and Engineering, Vol. 1, No. 2, pp. 98104, 2009.
  • B. Gobinathan, M.A. Mukunthan, S. Surendran, and V.P. Sundramurthy, “A Novel Method to Solve Real Time Security Issues in Software Industry using Advanced Cryptographic Techniques”, Scientific Programming, Vol. 2021, pp. 1-7, 2021.
  • N. Arivazhagan, K. Somasundaram, D. Vijendra Babu and V. Prabhu Sundramurthy, “Cloud-Internet of Health Things (IOHT) Task Scheduling using Hybrid Moth Flame Optimization with Deep Neural Network Algorithm for E Healthcare Systems”, Scientific Programming, Vol. 2022, pp. 1-8, 2022.
  • P. Krishan, “A Study on Dynamic and Static Clustering based Routing Schemes for Wireless Sensor Networks”, International Journal of Modern Engineering Research, Vol. 3, No. 2, pp. 1100-1104, 2013.
  • M. Malik and Y. Singh, “Analysis of Leach Protocol in Wireless Sensor Networks”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 2, pp. 178-184, 2013.
  • T. Kothmayr, C. Schmitt, W. Hu, M. Br and G. Carle, “DTLS based Security and Two-Way Authentication for the Internet of Things”, Ad Hoc Networks, Vol. 11, No. 8, pp. 2710-2723, 2013.
  • M. Wazid, A.K. Das, V. Odelu and N. Kumar, “Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks”, IEEE Internet of Things, Vol. 5, No. 1, pp. 269-282, 2017.
  • G. Dhiman, K. Somasundaram and K. Sharma, “Nature Inspired-Based Approach for Automated Cyberbullying Classification on Multimedia Social Networking”, Mathematical Problems in Engineering, Vol. 2021, pp. 121, 2021.
  • S. Soni and B. Dey, “Dynamic Selection of Cluster Head in Cluster of Cluster Heads within the Cluster in Heterogeneous Wireless Sensor Network”, Proceedings of IEEE International Conference on Advanced Communications, Control and Computing Technologies, pp. 877-881, 2014.
  • N. Sabor, S. Sasaki, M. Abo Zahhad and S.M. Ahmed, “A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions”, Wireless Communications and Mobile Computing, Vol. 2017, pp. 119, 2017.
  • X. Liu, “A Typical Hierarchical Routing Protocols for Wireless Sensor Networks: A Review”, IEEE Sensors, Vol. 15, No. 10, pp. 5372-5383, 2015.
  • S. Anjali and M. Sharma, “Wireless Sensor Networks: Routing Protocols and Security Issues”, Proceedings of International Conference on Computer Communication Networking Technologies, pp. 3-7, 2014.
  • T. Bhatia, S. Kansal, S. Goel and A.K. Verma, “A Genetic Algorithm based Distance-Aware Routing Protocol for Wireless Sensor Networks”, Computer and Electrical Engineering, Vol. 56, pp. 441-455, 2016.
  • P. Sivakumar and M. Radhika, “Performance Analysis of LEACH-GA over LEACH and LEACH-C in WSN”, Procedia Computer Science, Vol. 125, pp. 248-256, 2018.
  • A. Peiravi, H.R. Mashhadi and S. Hamed Javadi, “An Optimal Energy-Efficient Clustering Method in Wireless Sensor Networks using Multi-Objective Genetic Algorithm”, International Journal of Communication Systems, Vol. 26, No. 1, pp. 114-126, 2013.

Abstract Views: 198

PDF Views: 0




  • A Service Package Identifier Based Security Verification Algorithm For Wireless Mobile AD-HOC Network

Abstract Views: 198  |  PDF Views: 0

Authors

R. Sabitha
Department of Electronics and Communication Engineering, Hindustan College of Engineering and Technology, India
G. Kiruthiga
Department of Computer Science and Engineering, IES College of Engineering, India

Abstract


In general, the biggest problem with a mobile ad-hoc network is the threat to its security. This is because the mobile ad-hoc network is dismantled after a certain period of time, which spends a lot of time calculating its stability and greatly wastes its security dimensions. Thus, the security features on these temporary networks need to be strengthened as they pose the most threats. In this paper, a security algorithm designed in SID mode is proposed to fix security vulnerabilities in the wireless mobile ad-hoc network module. Its main feature is that its security definitions are defined according to the number of Service Package Identification assigned to it. The definition of numbers based on its importance is to make a list of related devices in order and, accordingly, bring those devices into the security module. Its security features have been improved so that the security modules remain active as long as the network is active.

Keywords


Service Package Identification, Ad-hoc Networks, MANET, Security, Stability

References