We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

An Integrated Adapted Key Management and Quality Data Delivery over Wireless Network

by P. Raju, C. Chandra Sekar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 146 - Number 15
Year of Publication: 2016
Authors: P. Raju, C. Chandra Sekar
10.5120/ijca2016910806

P. Raju, C. Chandra Sekar . An Integrated Adapted Key Management and Quality Data Delivery over Wireless Network. International Journal of Computer Applications. 146, 15 ( Jul 2016), 34-41. DOI=10.5120/ijca2016910806

@article{ 10.5120/ijca2016910806,
author = { P. Raju, C. Chandra Sekar },
title = { An Integrated Adapted Key Management and Quality Data Delivery over Wireless Network },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 146 },
number = { 15 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 34-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume146/number15/25477-2016910806/ },
doi = { 10.5120/ijca2016910806 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:50:35.860956+05:30
%A P. Raju
%A C. Chandra Sekar
%T An Integrated Adapted Key Management and Quality Data Delivery over Wireless Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 146
%N 15
%P 34-41
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless network broadcast the information with active node variance. Data delivery over wireless network is one of the key issues to be addressed. Many efficient data delivery methods are widely used in different network environments as they reduce the overhead traffic and delay. Hence they improve the network lifetime. However, they lack effective data delivery on different network environment and security. In this paper, to perform effective data delivery on different network environments, Routing Function Independent Data Delivery (RFIDD) scheme is introduced. The RFIDD scheme develops Observant Reasoning algorithms to identify concession nodes (i.e.,) packet dropping nodes. The Observant Reasoning (OR) algorithm provides suitable solution to ensure data delivery with average running formula in wireless network. OR-algorithm finds an optimal result in the sense that it recognizes every packet dropping nodes without introducing false negative rate. RFIDD Scheme also combines the Adapted Key Management Routing (AKMR) protocol to improve the security level while performing data delivery on wireless network. AKMR performs the encryption, authentication and decryption processes to attain higher security ratio in RFIDD Scheme. The integration of data delivery scheme with security measure is performed with three orders of magnitude which dynamically adjusts security level depending on the network state. In this paper, RFIDD scheme is analyzed to assess the data delivery ratio and packet dropping probability rate and compared to the state-of-the-art methods. RFIDD was also implemented NS2 and compared against Distributed Cache Invalidation Method and Redundancy Management of Multipath Routing to assess its performance experimentally. The security and average response time are reported versus several variables, where RFIDD showed to be superior when compared to the other methods.

References
  1. Fawaz, K. and Artail, H. 2013. DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks, IEEE Transactions on Mobile Computing, Volume 12, Issue 4, pp. 680-693.
  2. Al-Hamadi, H. and Chen, I.R. 2013. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks, IEEE Transactions on Network and Service Management, Volume 10, Issue 2, pp.189-203.
  3. Vasserman, E.Y. and Hopper, N. 2013. Vampire attacks: Draining life from wireless ad-hoc sensor networks, IEEE Transactions on Mobile Computing, Volume 12 Issue 2, pp.318-332.
  4. Yang, S., Yeo, C.K., and Lee, B.S. 2012. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, Volume 11, Issue 1, pp. 111-124.
  5. Cui, T., Lu, F., Sethuraman, V., Goteti, A., Subramanya, P., Rao, N., and Subrahmanya, P.2011. Throughput Optimization in High Speed Downlink Packet Access (HSDPA), IEEE Transactions on Wireless Communications, Volume 10, Issue 2, pp. 474-483.
  6. Yu, Z. and Guan, Y. 2010. A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks, IEEE/ACM Transactions on Networking, Volume 18, Issue 1, Pages 150-163.
  7. Parvez, N., Mahanti, A., and Williamson, C. 2010. An Analytic Throughput Model for TCP NewReno, IEEE/ACM Transactions on Networking, Volume 18, Issue 2, pp. 448-461.
  8. Starobinski, D. and Xiao, W. 2010. Asymptotically Optimal Data Dissemination in Multichannel Wireless Sensor Networks: Single Radios Suffice, IEEE/ACM Transactions on Networking, Volume 18, Issue 3, pp. 695-707.
  9. Dang, H. and Wu, H.2010. Clustering and Cluster-Based Routing Protocol for Delay-Tolerant Mobile Networks, IEEE Transactions on Wireless Communications, Volume 9, Issue 6, pp. 1874-1881.
  10. Dai, R., Wang, P., and Akyildiz, I.F.2012. Correlation-Aware QoS Routing With Differential Coding for Wireless Video Sensor Networks, IEEE Transactions on Multimedia, Volume 14, Issue 5, pp. 1469-1479.
  11. Wan, Z., Ren, K., and Gu, M. 2012. USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks, IEEE Transactions on Wireless Communications, Volume 11, Issue 5, pp. 1922-1932.
  12. Choi, B., Wong, T.F., and Shea, J.M .2012. Geographic Transmission with Optimized Relaying (GATOR) for the Uplink in Mesh Networks, IEEE Transactions on Wireless Communications, Volume 11, Issue 6, pp. 2095-2105.
  13. Alia, O.M 2014. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks, Hindawi Publishing Corporation, The Scientific World Journal, Volume 2014, pp. 1-10.
  14. Wang, S., Basalamah, A., Kim, S.M., Guo, S., Tobe,Y., and He, T . 2015. Link-Correlation-Aware Opportunistic Routing in Wireless Networks, IEEE Transactions on Wireless Communications, Volume 14, Issue 1, pp. 47-56.
  15. Sheikholeslami, F., Nasiri-Kenari, M., and Ashtiani, F. 2015. Optimal Probabilistic Initial and Target Channel Selection for Spectrum Handoff in Cognitive Radio Networks, IEEE Transactions on Wireless Communications, Volume 14, Issue 1, pp. 570-584.
  16. Zhou, Y. and Zhuang, W .2015. Throughput Analysis of Cooperative Communication in Wireless Ad Hoc Networks With Frequency Reuse, IEEE Transactions on Wireless Communications, Volume 14, Issue 1, pp. 205-218.
  17. Yaoa, L., Deng, J., Wanga, J., Wu, G. 2015. A-CACHE: An anchor-based public key caching scheme in large wireless networks, Elsevier, Computer Networks, Volume 87, pp. 78–88.
  18. Diaz, J.R., Lloret, J., Jimenez, J., Sendra, S., and Rodrigues, J.P.C. 2014. Fault Tolerant Mechanism for Multimedia Flows in Wireless Ad Hoc Networks Based on Fast Switching Paths, Hindawi Publishing Corporation, Mathematical Problems in Engineering, Volume 2014, pp.1-13.
  19. Lee, H.J. 2014. Greedy Data Transportation Scheme with Hard Packet Deadlines for Wireless Ad Hoc Networks, Hindawi Publishing Corporation, The Scientific World Journal, Volume 2014, pp. 1-9.
  20. Shen, H., Bai, G., Zhao, L., and Tang, Z .2012. An Adaptive Opportunistic Network Coding Mechanism in Wireless Multimedia Sensor Networks, Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks, Volume 2012, pp. 1-14.
Index Terms

Computer Science
Information Sciences

Keywords

Function Independent Data Delivery Observant Reasoning Concession nodes Key Management.