CFP last date
20 December 2024
Reseach Article

Multi-level Secure Architecture with Authentication and Message Encryption for MESHNET Security

by Gunjan Bhatnagar, Mandeep Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 5
Year of Publication: 2015
Authors: Gunjan Bhatnagar, Mandeep Singh
10.5120/21066-3735

Gunjan Bhatnagar, Mandeep Singh . Multi-level Secure Architecture with Authentication and Message Encryption for MESHNET Security. International Journal of Computer Applications. 119, 5 ( June 2015), 33-35. DOI=10.5120/21066-3735

@article{ 10.5120/21066-3735,
author = { Gunjan Bhatnagar, Mandeep Singh },
title = { Multi-level Secure Architecture with Authentication and Message Encryption for MESHNET Security },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 5 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 33-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number5/21066-3735/ },
doi = { 10.5120/21066-3735 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:03:16.295802+05:30
%A Gunjan Bhatnagar
%A Mandeep Singh
%T Multi-level Secure Architecture with Authentication and Message Encryption for MESHNET Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 5
%P 33-35
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In cellular networks, the data traffic generated by users is becoming more challenging as the network is overloaded and not secured. The three algorithms are used to manage the two networks i. e. 3G networks and Wi-Fi network in the previous research work are Heuristic, Greedy and the Random. The existing scheme used the IPSec for the authentication purpose, hence prone to various types of the security attacks. In the proposed scenario, it is proposing a security mechanism for data offloading mechanism for the secure exchange of data. The proposed model will also use the Multi-level secure authentication for the user & the data privacy and the integrity in the environment of MESHNET. The proposed security architecture includes the RSA encryption with the multi-variate key exchange scheme, which ensures the secure data exchange on the higher data transfer rate. This will reduces the load from the cellular networks in the real time applications. The performance of the proposed model would be tested with the various parameters like the throughput, the transmission delay, the probability of the detection, and probability of the false alarm, etc.

References
  1. Han, Bo, et al. "Mobile data offloading through opportunistic communications and social participation. " Mobile Computing, IEEE Transactions on 11. 5, pp. 821-834, IEEE, 2012.
  2. Han, Bo, Pan Hui, and Aravind Srinivasan. "Mobile data offloading in metropolitan area networks. " ACM SIGMOBILE Mobile Computing and Communications Review 14. 4, pp. 28-30, 2011.
  3. Lu Xiaofeng, Hui Pan, P. Lio, "Offloading mobile data from cellular networks through peer-to-peer Wi-Fi Communication: A subscribe-and-end architecture.
  4. M. H. Qutqut, F. M. Al-Turjman, H. S. Hassansein, "MFW: Mobile femtocells utilizing WiFI: A data offloading framework for cellular networks using mobile femtocells", ICC, vol. 1, pp. 6427-6431, IEEE, 2013.
  5. Mi. Jeong Yang, Soon Yong Lim, Hyeong Jun Park, Nam Hoon Park, "Solving the data overload: Device-to-device bearer control architecture for cellular data offloading", IVTM, vol. 8, issue 8, pp. 31-39, IEEE, 2013.
  6. Migault, Daniel, Daniel Palomares, Hendrik Hendrik, and Maryline Laurent. "Secure IPsec based offload architectures for mobile data. " In Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks, pp. 95-104. ACM, 2014.
  7. Petros S. Bithas et. al. , "Hybrid Cellular/WLAN with Wireless Offloading: Enabling Next Generation Wireless Networks", IJSAC, vol. 1, pp. 1-29, IEEE, 2013.
  8. Subramanian Vasudevan, Kathiravetpillai Sivanesan, Satish Kanugovi and Jialin Zou, "Enabling Data Offload and Proximity Services Using Device to Device Communication over Licensed Cellular Spectrum with Infrastructure Control", VTC Fall, vol. 78, pp. 1-7, IEEE, 2013.
  9. Thomas, Giles, et al. "Wave-induced motions of gas cat: A novel catamaran for gas processing and offloading. " ASME 2009 28th International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2009.
  10. Lee, Kyunghan, Joohyun Lee, Yung Yi, Injong Rhee, and Song Chong. "Mobile data offloading: How much can WiFi deliver?. " IEEE/ACM Transactions on Networking (TON) 21, no. 2 (2013): 536-550.
  11. Sankaran, C. B. "Data offloading techniques in 3GPP Rel-10 networks: A tutorial. " Communications Magazine, IEEE 50, no. 6 (2012): 46-53.
  12. Gupta, Vishal, and Mukesh Kumar Rohil. "Enhancing WiFi with IEEE802. 11u for mobile data offloading. " International Journal of Mobile Network Communications & Telematics (IJMNCT) 2, no. 4 (2012): 19-29.
  13. Gupta, Vishal, and Mukesh Kumar Rohil. "Enhancing WiFi with IEEE802. 11u for mobile data offloading. " International Journal of Mobile Network Communications & Telematics (IJMNCT) 2, no. 4 (2012): 19-29.
  14. Han, Bo, Pan Hui, V. S. Kumar, Madhav V. Marathe, Guanhong Pei, and Aravind Srinivasan. "Cellular traffic offloading through opportunistic communications: a case study. " In Proceedings of the 5th ACM workshop on Challenged networks, pp. 31-38. ACM, 2010.
  15. Liu, Shu, and Aaron Striegel. "Casting doubts on the viability of WiFi offloading. " In Proceedings of the 2012 ACM SIGCOMM workshop on Cellular networks: operations, challenges, and future design, pp. 25-30. ACM, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

MESHNET security Mobile data offloading security Mobile Wi-Fi data offloading RSA encryption authentication.