Enhanced security using multiple paths routine scheme in cloud-MANETs.
Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-organized mobile gadgets that can communicate with each other with no support from a central authority or infrastructure. The mai...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Springer Science and Business Media Deutschland GmbH
2023
|
Subjects: | |
Online Access: | http://eprints.utm.my/106407/1/TaoHai2023_EnhancedSecurityUsingMultiplePathsRoutine.pdf http://eprints.utm.my/106407/ http://dx.doi.org/10.1186/s13677-023-00443-5 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
Language: | English |
id |
my.utm.106407 |
---|---|
record_format |
eprints |
spelling |
my.utm.1064072024-07-08T06:47:59Z http://eprints.utm.my/106407/ Enhanced security using multiple paths routine scheme in cloud-MANETs. Hai, Tao Zhou, Jincheng Lu, Ye Jawawi, Dayang Wang, Dan Onyema, Edeh Michael Biamba, Cresantus T58.6-58.62 Management information systems Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-organized mobile gadgets that can communicate with each other with no support from a central authority or infrastructure. The main advantage of MANETs is its ability to manage mobility while data communication between different users in the system occurs. In MANETs, clustering is an active technique used to manage mobile nodes. The security of MANETs is a key aspect for the fundamental functionality of the network. Addressing the security-related problems ensures that the confidentiality and integrity of the data transmission is secure. MANETs are highly prone to attacks because of their properties.In clustering schemes, the network is broken down to sub-networks called clusters. These clusters can have overlapping nodes or be disjointed. An enhanced node referred to asthe Cluster Head (CH) is chosen from each set to overseetasks related to routing. It decreases the member nodes’ overhead and improvesthe performance of the system. The relationship between the nodes and CH may vary randomly, leading to re-associations and re-clustering in a MANET that is clustered. An efficient and effective routing protocol is required to allow networking and to find the most suitable paths between the nodes. The networking must be spontaneous, infrastructure-less, and provide end-to-end interactions. The aim of routing is the provision of maximum network load distribution and robust networks. This study focused on the creation of a maximal route between a pair of nodes, and to ensure the appropriate and accurate delivery of the packet. The proposed solution ensured that routing can be carried out with the lowest bandwidth consumption. Compared to existing protocols, the proposed solution had a control overhead of 24, packet delivery ratio of 81, the lowest average end-to-end delay of 6, and an improved throughput of 80,000, thereby enhancing the output of the network. Our result shows that multipath routing enables the network to identify alternate paths connecting the destination and source. Routing is required to conserve energy and for optimum bandwidth utilization. Springer Science and Business Media Deutschland GmbH 2023-12 Article PeerReviewed application/pdf en http://eprints.utm.my/106407/1/TaoHai2023_EnhancedSecurityUsingMultiplePathsRoutine.pdf Hai, Tao and Zhou, Jincheng and Lu, Ye and Jawawi, Dayang and Wang, Dan and Onyema, Edeh Michael and Biamba, Cresantus (2023) Enhanced security using multiple paths routine scheme in cloud-MANETs. Journal of Cloud Computing, 12 (1). pp. 1-23. ISSN 2192-113X http://dx.doi.org/10.1186/s13677-023-00443-5 DOI: 10.1186/s13677-023-00443-5 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
T58.6-58.62 Management information systems |
spellingShingle |
T58.6-58.62 Management information systems Hai, Tao Zhou, Jincheng Lu, Ye Jawawi, Dayang Wang, Dan Onyema, Edeh Michael Biamba, Cresantus Enhanced security using multiple paths routine scheme in cloud-MANETs. |
description |
Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-organized mobile gadgets that can communicate with each other with no support from a central authority or infrastructure. The main advantage of MANETs is its ability to manage mobility while data communication between different users in the system occurs. In MANETs, clustering is an active technique used to manage mobile nodes. The security of MANETs is a key aspect for the fundamental functionality of the network. Addressing the security-related problems ensures that the confidentiality and integrity of the data transmission is secure. MANETs are highly prone to attacks because of their properties.In clustering schemes, the network is broken down to sub-networks called clusters. These clusters can have overlapping nodes or be disjointed. An enhanced node referred to asthe Cluster Head (CH) is chosen from each set to overseetasks related to routing. It decreases the member nodes’ overhead and improvesthe performance of the system. The relationship between the nodes and CH may vary randomly, leading to re-associations and re-clustering in a MANET that is clustered. An efficient and effective routing protocol is required to allow networking and to find the most suitable paths between the nodes. The networking must be spontaneous, infrastructure-less, and provide end-to-end interactions. The aim of routing is the provision of maximum network load distribution and robust networks. This study focused on the creation of a maximal route between a pair of nodes, and to ensure the appropriate and accurate delivery of the packet. The proposed solution ensured that routing can be carried out with the lowest bandwidth consumption. Compared to existing protocols, the proposed solution had a control overhead of 24, packet delivery ratio of 81, the lowest average end-to-end delay of 6, and an improved throughput of 80,000, thereby enhancing the output of the network. Our result shows that multipath routing enables the network to identify alternate paths connecting the destination and source. Routing is required to conserve energy and for optimum bandwidth utilization. |
format |
Article |
author |
Hai, Tao Zhou, Jincheng Lu, Ye Jawawi, Dayang Wang, Dan Onyema, Edeh Michael Biamba, Cresantus |
author_facet |
Hai, Tao Zhou, Jincheng Lu, Ye Jawawi, Dayang Wang, Dan Onyema, Edeh Michael Biamba, Cresantus |
author_sort |
Hai, Tao |
title |
Enhanced security using multiple paths routine scheme in cloud-MANETs. |
title_short |
Enhanced security using multiple paths routine scheme in cloud-MANETs. |
title_full |
Enhanced security using multiple paths routine scheme in cloud-MANETs. |
title_fullStr |
Enhanced security using multiple paths routine scheme in cloud-MANETs. |
title_full_unstemmed |
Enhanced security using multiple paths routine scheme in cloud-MANETs. |
title_sort |
enhanced security using multiple paths routine scheme in cloud-manets. |
publisher |
Springer Science and Business Media Deutschland GmbH |
publishDate |
2023 |
url |
http://eprints.utm.my/106407/1/TaoHai2023_EnhancedSecurityUsingMultiplePathsRoutine.pdf http://eprints.utm.my/106407/ http://dx.doi.org/10.1186/s13677-023-00443-5 |
_version_ |
1804065499744567296 |