Refine your search
Collections
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kantharaju, H.C.
- A Novel Efficient Security Veerification Technique Based on Service Package Identifier in Wireless Mobile Ad-Hoc Networks
Abstract Views :124 |
PDF Views:0
Authors
Affiliations
1 Department of Artificial Intelligence and Machine Learning, Vemana Institute of Technology, IN
2 Department of Computer Science, Acharya Bangalore B School, IN
3 Department of Computer Science and Engineering, Adhiyamaan College of Engineering, IN
4 Department of Electronics and Communication Engineering, Roever Engineering College, IN
1 Department of Artificial Intelligence and Machine Learning, Vemana Institute of Technology, IN
2 Department of Computer Science, Acharya Bangalore B School, IN
3 Department of Computer Science and Engineering, Adhiyamaan College of Engineering, IN
4 Department of Electronics and Communication Engineering, Roever Engineering College, IN
Source
ICTACT Journal on Communication Technology, Vol 14, No 2 (2023), Pagination: 2907-2912Abstract
This paper presents a novel and efficient security verification technique for Wireless Mobile Ad-Hoc Networks (MANETs) using The Service Package Identifier (SPI). The dynamic and self-organizing nature of MANETs makes them susceptible to a variety of security threats. Using the SPI, the proposed technique authenticates and verifies the integrity of service bundles exchanged between network nodes. By employing the SPI as a unique identifier for each service packet, the technique protects against unauthorized access and data tampering and ensures secure communication. The experimental results demonstrate the efficacy and efficiency of the proposed technique, which offers improved MANET security and resiliency.Keywords
Security Verification, Service Package Identifier, Authentication, Integrity, Secure Communication, Unauthorized Access, Data Tampering, Resilience.References
- M. Garofalakis, J.M. Hellerstein and P. Maniatis, “Proof Sketches: Verifiable in Network Aggregation”, Proceedings of IEEE International Conference on Data Engineering, pp. 132-136, 2007.
- H. Chan, A. Perrig and D. Song, “Secure Hierarchical inNetwork Aggregation in Sensor Networks”, Proceedings of ACM Conference on Computer and Communications Security, pp. 278-287, 2006.
- L. Buttyan, P. Schaffer and I. Vajda, “Resilient Aggregation with Attack Detection in Sensor Networks”, Proceedings of ACM Conference on Sensor Networks and Systems for Pervasive Computing, pp. 331-336, 2006.
- Y. Yang, X. Wang, S. Zhu and G. Cao, “SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks”, Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing, pp. 889-893, 2006.
- S. Devaraju and S. Ramakrishnan, “Performance Analysis of Intrusion Detection System using Various Neural Network Classifiers”, Proceedings of International Conference on International Conference on Recent Trends in Information Technology, pp. 1033-1038, 2011.
- P. Vivekanandan and A. Sunitha Nadhini, “A Survey on Efficient Routing Protocol using Mobile Networks”, International Journal of Advances in Engineering and Technology, Vol. 6, No. 1, pp. 370-382, 2013.
- U. Meena and A. Sharma, “Secure Key Agreement with Rekeying using FLSO Routing Protocol in Wireless Sensor Network”, Wireless Personal Communications, Vol. 101, pp. 1177-1199, 2018.
- S. Kaur and R. Mahajan, “Hybrid Meta-Heuristic Optimization based Energy Efficient Protocol for Wireless Sensor Networks”, Egyptian Informatics Journal, Vol. 19, No. 3, pp. 145-150, 2018.
- B. Gobinathan, M.A. Mukunthan, S. Surendran, and V.P. Sundramurthy, “A Novel Method to Solve Real Time Security Issues in Software Industry using Advanced Cryptographic Techniques”, Scientific Programming, Vol. 2021, pp. 1-7, 2021.
- M. Ramkumar and T. Husna, “CEA: Certification based Encryption Algorithm for Enhanced Data Protection in Social Networks”, Fundamentals of Applied Mathematics and Soft Computing, Vol. 1, pp. 161-170, 2022.
- J. Singh and S. Sakthivel, “Energy-Efficient Clustering and Routing Algorithm Using Hybrid Fuzzy with Grey Wolf Optimization in Wireless Sensor Networks. Security and Communication Networks, Vol. 2022, pp. 1-14, 2022.
- S. Rajeshwari and P. Jayashree, “Security Issues in Protecting Computers and Maintenance”, Journal of Global Research in Computer Science, Vol. 4, No. 1, pp. 55-58, 2013.
- Energy-Efficient Cluster Head Selection in Manets Using Firefly Algorithm
Abstract Views :116 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Communication Engineering, St. Joseph’s Institute of Technology, IN
2 Department of Artificial Intelligence and Machine Learning, Vemana Institute of Technology, IN
3 Department of Computer Science and Engineering, Adhiyamaan College of Engineering, IN
4 Department of Mathematics and Computer Science, University of Africa, NG
1 Department of Electronics and Communication Engineering, St. Joseph’s Institute of Technology, IN
2 Department of Artificial Intelligence and Machine Learning, Vemana Institute of Technology, IN
3 Department of Computer Science and Engineering, Adhiyamaan College of Engineering, IN
4 Department of Mathematics and Computer Science, University of Africa, NG
Source
ICTACT Journal on Communication Technology, Vol 14, No 2 (2023), Pagination: 2933-2938Abstract
In mobile ad hoc networks (MANETs), the efficient energy-efficient cluster head selection (EECHS) is a significant issue. When an appropriate cluster head (CH) is chosen, MANETs' energy efficiency improves. Clusters are built in MANETs to facilitate communication between nodes. The EECHS problem has been addressed using a variety of clustering strategies, including distributed clustering and cluster-based routing. However, these approaches require high overhead and complexity, leading to suboptimal performance. Therefore, it is necessary to develop an algorithm that can select the best CH to facilitate efficient energy-efficient communication in MANETs. In this regard, the Firefly Algorithm (FA) has been proposed as an effective approach to solving the EECHS problem. FA is a type of swarm intelligence-based meta-heuristics algorithm inspired by the behavior of fireflies. FA is a simple and efficient optimization method that can be used to select the best CH in MANETs. The method has a number of benefits, including enhanced convergence rate and local search functionality. FA is also computationally effective and can adapt to shifting network conditions. This essay offers a thorough evaluation of the literature on the use of FA in MANETs to address the EECHS. Along with comparisons of their performances, a thorough examination of the suggested methodologies and algorithms is offered. Last but not least, various difficulties and potential research paths pertaining to the usage of the FA are explored.Keywords
Energy, Cluster Head, Selection, MANET, Firefly Algorithm.References
- B. Pitchaimanickam and G. Murugaboopathi, “A Hybrid Firefly Algorithm with Particle Swarm Optimization for Energy Efficient Optimal Cluster Head Selection in Wireless Sensor Networks”, Neural Computing and Applications, Vol. 32, pp. 7709-7723, 2020.
- Z. Wang and Q. Liu, “Energy Efficient Cluster based Routing Protocol for WSN using Firefly algorithm and Ant Colony Optimization”, Wireless Personal Communications, Vol. 125, No. 3, pp. 2167-2200, 2022.
- M. Baskaran and C. Sadagopan, “Synchronous Firefly Algorithm for Cluster Head Selection in WSN”, The Scientific World Journal, Vol. 2015, pp. 1-14, 2015.
- A. Sarkar and T. Senthil Murugan, “Cluster Head Selection for Energy Efficient and Delay-Less Routing in Wireless Sensor Network”, Wireless Networks, Vol. 25, pp. 303-320, 2019.
- T. Karthikeyan and K. Praghash, “Improved Authentication in Secured Multicast Wireless Sensor Network (MWSN) using Opposition Frog Leaping Algorithm to Resist Man-in-Middle Attack”, Wireless Personal Communications, Vol. 123, No. 2, pp. 1715-1731, 2022.
- K. Praghash and A.A. Stonier, “An Artificial Intelligence Based Sustainable Approaches-IoT Systems for Smart Cities”, Springer, 2023.
- N. Shanmugasundaram and J. Lloret, “Energy‐Efficient Resource Allocation Model for Device‐to‐Device Communication in 5G Wireless Personal Area Networks”, International Journal of Communication Systems, Vol. 43, pp. 5524-5534, 2023.
- J. Deepika and J. Jegathesh Amalraj, “Energy-Efficient Clustering and Routing Algorithm using Hybrid Fuzzy with Grey Wolf Optimization in Wireless Sensor Networks”, Security and Communication Networks, Vol. 2022, pp. 1-15, 2022.
- Y.H. Robinson, V. Saravanan and P.E. Darney, “Enhanced Energy Proficient Encoding Algorithm for Reducing Medium Time in Wireless Networks”, Wireless Personal Communications, Vol. 119, pp. 3569-3588, 2021.
- L. Nagarajan and S. Thangavelu, “Hybrid Grey Wolf Sunflower Optimisation Algorithm for Energy‐Efficient Cluster Head Selection in Wireless Sensor Networks for Lifetime Enhancement”, IET Communications, Vol. 15, No. 3, pp. 384-396, 2021.
- R. Sabitha and V. Saravanan, “Network Based Detection of IoT Attack using AIS-IDS Model”, Wireless Personal Communications, Vol. 128, No. 3, pp. 1543-1566, 2023.
- R.S. Latha and G. Murugesan, “Multi-Metric Clustering in Mobile Ad-Hoc Networks using Firefly Optimization Algorithm”, Asian Journal of Research in Social Sciences and Humanities, Vol. 6, No. 11, pp. 630-641, 2016.
- V. Saravanan and R. Rajkumar, “Secure Source-Based Loose RSA Encryption for Synchronization (SSOBRSAS) and Evolutionary Clustering Based Energy Estimation for Wireless Sensor Networks”, International Journal of Advanced Research in Computer Science, Vol. 5, No. 5, pp. 1-12, 2014.
- M. Rao and N. Singh, “Energy Efficient QoS Aware Hierarchical KF-MAC Routing Protocol in MANET”, Wireless Personal Communications, Vol. 101, pp. 635-648, 2018.