Intelligent Communication and Computational Technologies by Yu-Chen Hu Shailesh Tiwari Krishn K. Mishra & Munesh C. Trivedi
Author:Yu-Chen Hu, Shailesh Tiwari, Krishn K. Mishra & Munesh C. Trivedi
Language: eng
Format: epub
Publisher: Springer Singapore, Singapore
1 Introduction
Suppose that we want to establish the communication connection between two floors of any organization building or between two buildings in the same campus using wireless short-range communicating electronic devices. In the organization each employee has mobile devices and some fixed devices such as printer, computer, etc. We can connect these devices using fixed wired network or by infrastructure access points, but this restricts the mob ability of the devices. Another option is used in base station based network, i.e. cellular network which allows the large communication range; but the limitation is that, these cellular networks are costly and time-consuming deploying networks. Alternatively, at last we need a network that should be fast and cheap in deployment, provide sufficient range for communication, easily scalable, support mob ability, etc., and these features are provided by only one network, i.e., mobile ad hoc network (MANET) [1, 2]. Apart from these types of applications, MANETs are also used in defense, emergency relief operations, environment monitoring, VANETs, WSNs, etc.
With the increasing number of applications, the demand for secure communication is increasing. Due to the fundament characteristics of MANET [3], secure communication is very difficult [4, 5] to achieve, because its nature-like communication medium is open wireless which can easily be accessed by anyone who are coming in the radio range of the communicating devices, nodes are physically vulnerable, less-efficient (processing power, memory) communicating devices, the absence of central authority, free from the constraint of topological structure of network, etc.
Communicating devices used in MANET have limited memory and processing power, because of this asymmetric key based security scheme is not the good solution for implementing security scheme in MANETs. With considering this limitation in mind, in this work symmetric key based authentication mechanism has proposed to ensure the secure communication between the communicating parties. The proposed model secures the network from the well-known and frequently occurred attacks (impersonation, modifies routing information, black hole). In this work, two levels of authentication have been used, first level for hop-to-hop authentication [6, 7] (MD5 algorithm has used for authentication code generation) and second level for end-to-end authentication (SHA1 algorithm has for authentication code generation). Digest_1 is the size of 128 bits generated by the MD5 algorithm and Digest_2 is the size of 160 bit generated by SHA 1 algorithm.
The remainder of this paper is organized as follows: Sect. 2 introduces related work and motivation to do this research. Section 3 describes the proposed methodology. Section 4 explains simulation result and discussion, and finally conclusion is defined in Sect. 5.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8309)
Test-Driven Development with Java by Alan Mellor(6776)
Data Augmentation with Python by Duc Haba(6691)
Principles of Data Fabric by Sonia Mezzetta(6437)
Learn Blender Simulations the Right Way by Stephen Pearson(6337)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6211)
Hadoop in Practice by Alex Holmes(5965)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5813)
RPA Solution Architect's Handbook by Sachin Sahgal(5608)
Big Data Analysis with Python by Ivan Marin(5388)
The Infinite Retina by Robert Scoble Irena Cronin(5300)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5155)
Pretrain Vision and Large Language Models in Python by Emily Webber(4353)
Infrastructure as Code for Beginners by Russ McKendrick(4117)
Functional Programming in JavaScript by Mantyla Dan(4042)
The Age of Surveillance Capitalism by Shoshana Zuboff(3961)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3833)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3633)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3606)
