1,370 research outputs found

    A Novel Encryption Scheme for Providing Security and Energy Efficiency in Mobile Ad Hoc Networks

    Get PDF
    A Mobile Ad Hoc Network is a decentralized kind of remote system. It doesn't have any altered foundation and the hubs can impart straightforwardly between one another. Because of its open nature issues like security and vitality utilization emerges. This paper presents an in number encryption calculation keeping in mind the end goal to expand dependability and security for MANETs. At the point when huge volume of information is to be sent, information pressure method is a straightforward procedure, with the advantage of diminishing the transmission rate that devours less transfer speed and low power. Lempel �Ziv � Welch (LZW) pressure calculation when connected on coded message assists in furnishing security with low battery utilization. Such a plan composed practically speaking will help in building secure MANET based application

    Implementation of Majority Based voting protocol in group based system with re-ranking

    Get PDF
    A Mobile Ad Hoc Network is a decentralized kind of remote system. It doesn't have any altered foundation and the hubs can impart straightforwardly between one another. Because of its open nature issues like security and vitality utilization emerges. This paper presents an in number encryption calculation keeping in mind the end goal to expand dependability and security for MANETs. At the point when huge volume of information is to be sent, information pressure method is a straightforward procedure, with the advantage of diminishing the transmission rate that devours less transfer speed and low power. Lempel �Ziv � Welch (LZW) pressure calculation when connected on coded message assists in furnishing security with low battery utilization. Such a plan composed practically speaking will help in building secure MANET based application

    A Novel Encryption Scheme for Providing Security and Energy Efficiency in Mobile Ad-Hoc Networks

    Get PDF
    A Mobile Ad Hoc Network is a decentralized kind of remote system. It doesn't have any altered foundation and the hubs can impart straightforwardly between one another. Because of its open nature issues like security and vitality utilization emerges. This paper presents an in number encryption calculation keeping in mind the end goal to expand dependability and security for MANETs. At the point when huge volume of information is to be sent, information pressure method is a straightforward procedure, with the advantage of diminishing the transmission rate that devours less transfer speed and low power. Lempel –Ziv – Welch (LZW) pressure calculation when connected on coded message assists in furnishing security with low battery utilization. Such a plan composed practically speaking will help in building secure MANET based application

    A Marketplace for Efficient and Secure Caching for IoT Applications in 5G Networks

    Get PDF
    As the communication industry is progressing towards fifth generation (5G) of cellular networks, the traffic it carries is also shifting from high data rate traffic from cellular users to a mixture of high data rate and low data rate traffic from Internet of Things (IoT) applications. Moreover, the need to efficiently access Internet data is also increasing across 5G networks. Caching contents at the network edge is considered as a promising approach to reduce the delivery time. In this paper, we propose a marketplace for providing a number of caching options for a broad range of applications. In addition, we propose a security scheme to secure the caching contents with a simultaneous potential of reducing the duplicate contents from the caching server by dividing a file into smaller chunks. We model different caching scenarios in NS-3 and present the performance evaluation of our proposal in terms of latency and throughput gains for various chunk sizes

    Novel framework using dynamic passphrase towards secure and energy-efficient communication in MANET

    Get PDF
    At Mobile Adhoc Network (MANET) has been long-researched topic in adhoc network owing to the associated advantages in its cost-effective application as well as consistent loophopes owing to its inherent charecteristics. This manuscript draws a relationship between the energy factor and security factor which has not been emphasized in any existing studies much. Review of existing security approaches shows that they are highly attack specific, uses complex encryption, and overlooks the involvement of energy factor in it. Therefore, the proposed system introduces a novel mechanism where security tokens and passphrases are utilized in order to offer better security. The proposed system also introduces the usage of an agent node which communications with mobile nodes using group-based communication system thereby ensuring reduced computational effort of mobile nodes towards establishing secured communication. The outcome shows proposed system offers better outcome in contrast to existing system

    Secure authentication for remote patient monitoring withwireless medical sensor networks

    Get PDF
    There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes. © 2016 by the authors; licensee MDPI, Basel, Switzerland
    • …
    corecore