Enhanced security using multiple paths routine scheme in cloud-MANETs.

Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-organized mobile gadgets that can communicate with each other with no support from a central authority or infrastructure. The mai...

Full description

Saved in:
Bibliographic Details
Main Authors: Hai, Tao, Zhou, Jincheng, Lu, Ye, Jawawi, Dayang, Wang, Dan, Onyema, Edeh Michael, Biamba, Cresantus
Format: Article
Language:English
Published: Springer Science and Business Media Deutschland GmbH 2023
Subjects:
Online Access:http://eprints.utm.my/106407/1/TaoHai2023_EnhancedSecurityUsingMultiplePathsRoutine.pdf
http://eprints.utm.my/106407/
http://dx.doi.org/10.1186/s13677-023-00443-5
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
id my.utm.106407
record_format eprints
spelling my.utm.1064072024-07-08T06:47:59Z http://eprints.utm.my/106407/ Enhanced security using multiple paths routine scheme in cloud-MANETs. Hai, Tao Zhou, Jincheng Lu, Ye Jawawi, Dayang Wang, Dan Onyema, Edeh Michael Biamba, Cresantus T58.6-58.62 Management information systems Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-organized mobile gadgets that can communicate with each other with no support from a central authority or infrastructure. The main advantage of MANETs is its ability to manage mobility while data communication between different users in the system occurs. In MANETs, clustering is an active technique used to manage mobile nodes. The security of MANETs is a key aspect for the fundamental functionality of the network. Addressing the security-related problems ensures that the confidentiality and integrity of the data transmission is secure. MANETs are highly prone to attacks because of their properties.In clustering schemes, the network is broken down to sub-networks called clusters. These clusters can have overlapping nodes or be disjointed. An enhanced node referred to asthe Cluster Head (CH) is chosen from each set to overseetasks related to routing. It decreases the member nodes’ overhead and improvesthe performance of the system. The relationship between the nodes and CH may vary randomly, leading to re-associations and re-clustering in a MANET that is clustered. An efficient and effective routing protocol is required to allow networking and to find the most suitable paths between the nodes. The networking must be spontaneous, infrastructure-less, and provide end-to-end interactions. The aim of routing is the provision of maximum network load distribution and robust networks. This study focused on the creation of a maximal route between a pair of nodes, and to ensure the appropriate and accurate delivery of the packet. The proposed solution ensured that routing can be carried out with the lowest bandwidth consumption. Compared to existing protocols, the proposed solution had a control overhead of 24, packet delivery ratio of 81, the lowest average end-to-end delay of 6, and an improved throughput of 80,000, thereby enhancing the output of the network. Our result shows that multipath routing enables the network to identify alternate paths connecting the destination and source. Routing is required to conserve energy and for optimum bandwidth utilization. Springer Science and Business Media Deutschland GmbH 2023-12 Article PeerReviewed application/pdf en http://eprints.utm.my/106407/1/TaoHai2023_EnhancedSecurityUsingMultiplePathsRoutine.pdf Hai, Tao and Zhou, Jincheng and Lu, Ye and Jawawi, Dayang and Wang, Dan and Onyema, Edeh Michael and Biamba, Cresantus (2023) Enhanced security using multiple paths routine scheme in cloud-MANETs. Journal of Cloud Computing, 12 (1). pp. 1-23. ISSN 2192-113X http://dx.doi.org/10.1186/s13677-023-00443-5 DOI: 10.1186/s13677-023-00443-5
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic T58.6-58.62 Management information systems
spellingShingle T58.6-58.62 Management information systems
Hai, Tao
Zhou, Jincheng
Lu, Ye
Jawawi, Dayang
Wang, Dan
Onyema, Edeh Michael
Biamba, Cresantus
Enhanced security using multiple paths routine scheme in cloud-MANETs.
description Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-organized mobile gadgets that can communicate with each other with no support from a central authority or infrastructure. The main advantage of MANETs is its ability to manage mobility while data communication between different users in the system occurs. In MANETs, clustering is an active technique used to manage mobile nodes. The security of MANETs is a key aspect for the fundamental functionality of the network. Addressing the security-related problems ensures that the confidentiality and integrity of the data transmission is secure. MANETs are highly prone to attacks because of their properties.In clustering schemes, the network is broken down to sub-networks called clusters. These clusters can have overlapping nodes or be disjointed. An enhanced node referred to asthe Cluster Head (CH) is chosen from each set to overseetasks related to routing. It decreases the member nodes’ overhead and improvesthe performance of the system. The relationship between the nodes and CH may vary randomly, leading to re-associations and re-clustering in a MANET that is clustered. An efficient and effective routing protocol is required to allow networking and to find the most suitable paths between the nodes. The networking must be spontaneous, infrastructure-less, and provide end-to-end interactions. The aim of routing is the provision of maximum network load distribution and robust networks. This study focused on the creation of a maximal route between a pair of nodes, and to ensure the appropriate and accurate delivery of the packet. The proposed solution ensured that routing can be carried out with the lowest bandwidth consumption. Compared to existing protocols, the proposed solution had a control overhead of 24, packet delivery ratio of 81, the lowest average end-to-end delay of 6, and an improved throughput of 80,000, thereby enhancing the output of the network. Our result shows that multipath routing enables the network to identify alternate paths connecting the destination and source. Routing is required to conserve energy and for optimum bandwidth utilization.
format Article
author Hai, Tao
Zhou, Jincheng
Lu, Ye
Jawawi, Dayang
Wang, Dan
Onyema, Edeh Michael
Biamba, Cresantus
author_facet Hai, Tao
Zhou, Jincheng
Lu, Ye
Jawawi, Dayang
Wang, Dan
Onyema, Edeh Michael
Biamba, Cresantus
author_sort Hai, Tao
title Enhanced security using multiple paths routine scheme in cloud-MANETs.
title_short Enhanced security using multiple paths routine scheme in cloud-MANETs.
title_full Enhanced security using multiple paths routine scheme in cloud-MANETs.
title_fullStr Enhanced security using multiple paths routine scheme in cloud-MANETs.
title_full_unstemmed Enhanced security using multiple paths routine scheme in cloud-MANETs.
title_sort enhanced security using multiple paths routine scheme in cloud-manets.
publisher Springer Science and Business Media Deutschland GmbH
publishDate 2023
url http://eprints.utm.my/106407/1/TaoHai2023_EnhancedSecurityUsingMultiplePathsRoutine.pdf
http://eprints.utm.my/106407/
http://dx.doi.org/10.1186/s13677-023-00443-5
_version_ 1804065499744567296