Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Novel Efficient Security Veerification Technique Based on Service Package Identifier in Wireless Mobile Ad-Hoc Networks


Affiliations
1 Department of Artificial Intelligence and Machine Learning, Vemana Institute of Technology, India
2 Department of Computer Science, Acharya Bangalore B School, India
3 Department of Computer Science and Engineering, Adhiyamaan College of Engineering, India
4 Department of Electronics and Communication Engineering, Roever Engineering College, India
     

   Subscribe/Renew Journal


This paper presents a novel and efficient security verification technique for Wireless Mobile Ad-Hoc Networks (MANETs) using The Service Package Identifier (SPI). The dynamic and self-organizing nature of MANETs makes them susceptible to a variety of security threats. Using the SPI, the proposed technique authenticates and verifies the integrity of service bundles exchanged between network nodes. By employing the SPI as a unique identifier for each service packet, the technique protects against unauthorized access and data tampering and ensures secure communication. The experimental results demonstrate the efficacy and efficiency of the proposed technique, which offers improved MANET security and resiliency.

Keywords

Security Verification, Service Package Identifier, Authentication, Integrity, Secure Communication, Unauthorized Access, Data Tampering, Resilience.
Subscription Login to verify subscription
User
Notifications
Font Size

  • M. Garofalakis, J.M. Hellerstein and P. Maniatis, “Proof Sketches: Verifiable in Network Aggregation”, Proceedings of IEEE International Conference on Data Engineering, pp. 132-136, 2007.
  • H. Chan, A. Perrig and D. Song, “Secure Hierarchical inNetwork Aggregation in Sensor Networks”, Proceedings of ACM Conference on Computer and Communications Security, pp. 278-287, 2006.
  • L. Buttyan, P. Schaffer and I. Vajda, “Resilient Aggregation with Attack Detection in Sensor Networks”, Proceedings of ACM Conference on Sensor Networks and Systems for Pervasive Computing, pp. 331-336, 2006.
  • Y. Yang, X. Wang, S. Zhu and G. Cao, “SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks”, Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing, pp. 889-893, 2006.
  • S. Devaraju and S. Ramakrishnan, “Performance Analysis of Intrusion Detection System using Various Neural Network Classifiers”, Proceedings of International Conference on International Conference on Recent Trends in Information Technology, pp. 1033-1038, 2011.
  • P. Vivekanandan and A. Sunitha Nadhini, “A Survey on Efficient Routing Protocol using Mobile Networks”, International Journal of Advances in Engineering and Technology, Vol. 6, No. 1, pp. 370-382, 2013.
  • U. Meena and A. Sharma, “Secure Key Agreement with Rekeying using FLSO Routing Protocol in Wireless Sensor Network”, Wireless Personal Communications, Vol. 101, pp. 1177-1199, 2018.
  • S. Kaur and R. Mahajan, “Hybrid Meta-Heuristic Optimization based Energy Efficient Protocol for Wireless Sensor Networks”, Egyptian Informatics Journal, Vol. 19, No. 3, pp. 145-150, 2018.
  • B. Gobinathan, M.A. Mukunthan, S. Surendran, and V.P. Sundramurthy, “A Novel Method to Solve Real Time Security Issues in Software Industry using Advanced Cryptographic Techniques”, Scientific Programming, Vol. 2021, pp. 1-7, 2021.
  • M. Ramkumar and T. Husna, “CEA: Certification based Encryption Algorithm for Enhanced Data Protection in Social Networks”, Fundamentals of Applied Mathematics and Soft Computing, Vol. 1, pp. 161-170, 2022.
  • J. Singh and S. Sakthivel, “Energy-Efficient Clustering and Routing Algorithm Using Hybrid Fuzzy with Grey Wolf Optimization in Wireless Sensor Networks. Security and Communication Networks, Vol. 2022, pp. 1-14, 2022.
  • S. Rajeshwari and P. Jayashree, “Security Issues in Protecting Computers and Maintenance”, Journal of Global Research in Computer Science, Vol. 4, No. 1, pp. 55-58, 2013.

Abstract Views: 236

PDF Views: 0




  • A Novel Efficient Security Veerification Technique Based on Service Package Identifier in Wireless Mobile Ad-Hoc Networks

Abstract Views: 236  |  PDF Views: 0

Authors

H.C. Kantharaju
Department of Artificial Intelligence and Machine Learning, Vemana Institute of Technology, India
V.V. Apurva
Department of Computer Science, Acharya Bangalore B School, India
B. Gopinathan
Department of Computer Science and Engineering, Adhiyamaan College of Engineering, India
A. Nallathambi
Department of Electronics and Communication Engineering, Roever Engineering College, India

Abstract


This paper presents a novel and efficient security verification technique for Wireless Mobile Ad-Hoc Networks (MANETs) using The Service Package Identifier (SPI). The dynamic and self-organizing nature of MANETs makes them susceptible to a variety of security threats. Using the SPI, the proposed technique authenticates and verifies the integrity of service bundles exchanged between network nodes. By employing the SPI as a unique identifier for each service packet, the technique protects against unauthorized access and data tampering and ensures secure communication. The experimental results demonstrate the efficacy and efficiency of the proposed technique, which offers improved MANET security and resiliency.

Keywords


Security Verification, Service Package Identifier, Authentication, Integrity, Secure Communication, Unauthorized Access, Data Tampering, Resilience.

References