Open Access
Subscription Access
Open Access
Subscription Access
A Novel Efficient Security Veerification Technique Based on Service Package Identifier in Wireless Mobile Ad-Hoc Networks
Subscribe/Renew Journal
This paper presents a novel and efficient security verification technique for Wireless Mobile Ad-Hoc Networks (MANETs) using The Service Package Identifier (SPI). The dynamic and self-organizing nature of MANETs makes them susceptible to a variety of security threats. Using the SPI, the proposed technique authenticates and verifies the integrity of service bundles exchanged between network nodes. By employing the SPI as a unique identifier for each service packet, the technique protects against unauthorized access and data tampering and ensures secure communication. The experimental results demonstrate the efficacy and efficiency of the proposed technique, which offers improved MANET security and resiliency.
Keywords
Security Verification, Service Package Identifier, Authentication, Integrity, Secure Communication, Unauthorized Access, Data Tampering, Resilience.
Subscription
Login to verify subscription
User
Font Size
Information
- M. Garofalakis, J.M. Hellerstein and P. Maniatis, “Proof Sketches: Verifiable in Network Aggregation”, Proceedings of IEEE International Conference on Data Engineering, pp. 132-136, 2007.
- H. Chan, A. Perrig and D. Song, “Secure Hierarchical inNetwork Aggregation in Sensor Networks”, Proceedings of ACM Conference on Computer and Communications Security, pp. 278-287, 2006.
- L. Buttyan, P. Schaffer and I. Vajda, “Resilient Aggregation with Attack Detection in Sensor Networks”, Proceedings of ACM Conference on Sensor Networks and Systems for Pervasive Computing, pp. 331-336, 2006.
- Y. Yang, X. Wang, S. Zhu and G. Cao, “SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks”, Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing, pp. 889-893, 2006.
- S. Devaraju and S. Ramakrishnan, “Performance Analysis of Intrusion Detection System using Various Neural Network Classifiers”, Proceedings of International Conference on International Conference on Recent Trends in Information Technology, pp. 1033-1038, 2011.
- P. Vivekanandan and A. Sunitha Nadhini, “A Survey on Efficient Routing Protocol using Mobile Networks”, International Journal of Advances in Engineering and Technology, Vol. 6, No. 1, pp. 370-382, 2013.
- U. Meena and A. Sharma, “Secure Key Agreement with Rekeying using FLSO Routing Protocol in Wireless Sensor Network”, Wireless Personal Communications, Vol. 101, pp. 1177-1199, 2018.
- S. Kaur and R. Mahajan, “Hybrid Meta-Heuristic Optimization based Energy Efficient Protocol for Wireless Sensor Networks”, Egyptian Informatics Journal, Vol. 19, No. 3, pp. 145-150, 2018.
- B. Gobinathan, M.A. Mukunthan, S. Surendran, and V.P. Sundramurthy, “A Novel Method to Solve Real Time Security Issues in Software Industry using Advanced Cryptographic Techniques”, Scientific Programming, Vol. 2021, pp. 1-7, 2021.
- M. Ramkumar and T. Husna, “CEA: Certification based Encryption Algorithm for Enhanced Data Protection in Social Networks”, Fundamentals of Applied Mathematics and Soft Computing, Vol. 1, pp. 161-170, 2022.
- J. Singh and S. Sakthivel, “Energy-Efficient Clustering and Routing Algorithm Using Hybrid Fuzzy with Grey Wolf Optimization in Wireless Sensor Networks. Security and Communication Networks, Vol. 2022, pp. 1-14, 2022.
- S. Rajeshwari and P. Jayashree, “Security Issues in Protecting Computers and Maintenance”, Journal of Global Research in Computer Science, Vol. 4, No. 1, pp. 55-58, 2013.
Abstract Views: 218
PDF Views: 0