999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node

2022-03-14 09:24:50NehaMalhotraandManjuBala
Computers Materials&Continua 2022年3期

Neha Malhotra and Manju Bala

1

I.K.Gujral Punjab Technical University,Kapurthala,144603,India

2Lovely Professional University,Phagwara,144411,India

3Khalsa College of Engineering and Technology,Amritsar,143001,India

Abstract:Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility.In such attacks, an adversary accesses a few network nodes, generates replication, then inserts this replication into the network,potentially resulting in numerous internal network attacks.Most existing techniques use a central base station, which introduces several difficulties into the system due to the network’s reliance on a single point, while other ways generate more overhead while jeopardising network lifetime.In this research,an intelligent double hashing-based clone node identification scheme was used,which reduces communication and memory costs while performing the clone detection procedure.The approach works in two stages:in the first,the network is deployed using an intelligent double hashing procedure to avoid any network collisions and then in the second, the clone node identification procedure searches for any clone node in the network.This first phase verifies the node prior to network deployment, and then, whenever a node wants to interact, it executes the second level of authentication.End-to-end delay,which is bound to increase owing to the injection of clone nodes,and packet loss,which is reduced by the double hashing technique,were used to evaluate the performance of the aforementioned approach.

Keywords: Node authentication; clone node; mobile computing; double hashing; fault tolerance

1 Introduction

Mobile computing is extensively used in many industries where a fast and efficient response is essential.Smart schools and workplaces, the health care industry, weather forecasting, the military,and a variety of monitoring environments are all examples of such applications.The use of mobile computing in the system has numerous constraints that must be addressed, such as the nodes in such systems having resource issues such as low cost, battery, bandwidth, memory, and so on, which must be handled in such a way that it does not directly affect network health.Nodes in such a network communicate with one another and with a base station, emphasising the importance of all nodes’legitimacy [1].Because nodes are deployed in an unmanaged, hostile,and open environment, adversaries of many types can target them by initiating various attacks,such as denial of service, flooding, replication attacks, and so on [2].The network’s nodes are likely to be compromised [3], as adversaries often acquire the target node’s private information and credentials in order to impact a large number of other nodes in the network [4], as well as utilise this information to build a variety of clone nodes under their control.The adversary’s clones have the identical node id and other acquired information to do malicious activities in the system.

These clone nodes may act like regular nodes, making them difficult to identify in the network.However, many security problems arise as a result of attacks on vulnerable nodes and inadequate resources [5].As a result, much research has been conducted in the literature to improve clone node detection methods in order to protect the system against clone attacks.These techniques have been classified as centralised and distributed, witness-based or not, locationdependent or not.The main contribution of the work is that, when the network has been deployed using the double hashing method, if a collision occurs, which means that the generated index is occupied by another node in the network, it can be easily resolved by calculating the index using the second hash function.A clone node can be easily located in the network with this hashing searching technique.This solution is not dependent completely on central base station, which resolves numerous issues into the system owing to the network’s reliance on a single point, while improving additional overhead by not compromising network lifespan.

Due to the increase in memory and space complexity in the existing methods of node authentication, the majority of techniques raise the overhead while compromising the network lifespan.The suggested node authentication method seeks to reduce communication and memory costs.These predicted changes resulted in the usage of the suggested protocol DHFNA, which shows that as mobility support improves, the number of mobile devices grows over time in the form of mobile nodes linked in a network.Also, each mobile node uses a double hashing technique to prove its sustainability, which is the most important need of any mobile network, that all nodes in the network be verified to avoid malicious actions.

The remaining work is organised as follows: Section 2 represents related work in this field of clone node detection.Section 3 represents the proposed work’s system model and network model.Section 4 represents the algorithm used for network deployment and clone node detection.Section 5 represents the proposed work’s simulation, and section 6 represents the proposed work’s comparison.

2 Related Work

Several clone node detection techniques and fault detection techniques have been proposed in the literature, with the majority of them focusing on the node’s location, because each node in the network has a unique node id and spatial coordinates, and if two different nodes in the network claim the same node id but with different spatial coordinates, it clearly indicates the presence of a clone node and its attack.In [6] replication attacks were detected using nearby social signatures.Witness nodes [7] need more battery power, memory, energy, and other resources than normal nodes.Furthermore, the witness node is the most vulnerable in the network and may be readily captured by the attacker [8].The majority of suggested methods in the literature use witness finding methodology, such as RM and LSM [9,10], RED, Random walk-based protocols, and so on.This approach is based on nodes signing in and transferring geographical coordinates [11]introduces a centralised detection technique based on a random key.The technique focuses on the intended pattern in the pre-distribution of a random key to all accessible nodes, and if the pre-set key count exceeds a certain threshold, that node is identified as a clone node.The suggested approach includes a bloom filter for collecting important use data.The authors of [12] use a method based on intersection and union on a network subset that gathers adjacent information in a distributed manner and executes a SET operation on base station nodes.This method may identify internal assaults resulting from evidential analysis.This may be done by combining several pieces of evidence gathered from suffering nodes, i.e., nodes that were attacked.The authors of [13] provide two methods for detecting replica nodes.Whereas in the first phase, a node-tonetwork broadcast occurs and transmits the position of the node in the network.The authors utilised the localization method in [14], where clone node identification occurs in clusters utilising RFID and the localization technique.The authors propose two approaches for detecting cloned nodes: one based on RFID to authenticate the node and another based on geolocation techniques to identify the cloned node.When compared to previous methods, the suggested approach has shorter transmission latency and improved detection [15] employs a key distribution mechanism in which a node must authenticate itself in order to start any communication or create a connection using a key.The base station monitors the use of the keys [16] in use on a regular and random basis.Various methods for combating clone node attacks have also been proposed, including network-based detection, centralised detection, and distributed detection approaches.Key applications, base stations, social neighbourhood signatures, cluster head, zone, and neighbouring methods were among the sub approaches.The authors provide a concise overview of network security problems such as key management, node authentication, and safe routing [17].Tab.1 provides a comprehensive comparison.

Table 1: Comparison of the existing clone detection schemes

Where, n- number of nodes, d-degree of neighboring nodes, w- number of witness nodes and c- communication radius.The proposed technique is completely distributed in nature where all the nodes in the network participate so that the workload cannot be on one central node.This scheme will work in two phases network expansion phase and a clone detection phase.

3 System Model and Assumptions

The base station is considered to be at the network’s core in the provided architecture.The network nodes have been deployed at random around the base station.Each node in the network has a unique id and a list of its one-hop neighbours [18].Moreover, all nodes in the network are aware of their geographical locations.Also, once the deployment phase is completed, nodes with new ids are not allowed to join the network [19,20].Communication between a base station and other network nodes takes place through intermediary nodes.All nodes transmit their observation data to the base station on a regular basis [21,22].The network model is shown in Fig.1.For the adversary paradigm, the primary goal is to destroy or control the network area.This technique is less expensive than inserting duplicate nodes into the network for testing.The attacker compromises a few nodes before replicating its data in mass.Adversaries in the suggested system tend to control the network partly by attacking its few accessible nodes.In the example, the attacker has built a duplicate node and put it in the desired position.An attacker may launch a variety of attacks on the network using these newly generated clone nodes [23].The clone nodes that have been deployed in various places seem to be normal, with legitimate node ids.

Figure 1: Network model

Assumptions for the network and adversary model have been given below:

? Processes/nodes in the mobile computing environment are uniformly distributed.

? Each process/node has been identified by its unique id which is static.

? An adversary cannot create an ID for the clone nodes

? The adversary could capture a limited amount of normal nodes.

4 Proposed Work

In the proposed method, the node-id is utilised as a key index to build the hash table of a network node.A unique hash function was used to associate a node id with a specific key in order to access the nodes in the network as quickly as possible.The efficiency of node access is completely dependent on the type of hash function employed, which does not return zero.The suggested approach accomplishes the following tasks:

a.Creates a hash table, which is an array that stores references to nodes.If no such node id exists for the evaluated hash function value, this hash table returns a null entry.

b.A hash function is a function that converts arbitrary-sized data to fixed-size values.In a hash table, these values serve as network node indexes.

c.If the hash function computes a value that is already held by another node in the network,this is referred to as a collision, and it will be addressed by computing the second hash function to create a new address for the collided node.

4.1 Network Deployment Phase

Nodes available in the network have their unique node id which is used for indexing in the hash table.With the given list of nodes in the network, its index in hash table has been computed using (1) and methodology has been explained in Fig.2:

where ‘m’is the size of the hash table, ‘key’is the node and ‘H1’is the hash function.In case if the value computed in Eq.(1) is already occupied by another node then it results in the collision which can be further dealt with using (2):

where H2is the second hash function computed to resolve collisions, in case the generated index position in Eq.(1) is already occupied by any other value.Whenever there is a collision, the node will be inserted at the index calculated using the below mentioned for (3):

?

(Continued)

?

Figure 2: Step by step process for network deployment

Once all the nodes in the network have been deployed, then each node exchanges its node id and spatial coordinates with each other to store the value of its neighboring nodes.

4.2 Clone Node Detection Phase

The suggested work’s second step focuses on identifying the clone in the network.This second phase identifies the existence of duplicate/clone nodes in the network as soon as the network is installed in the first phase.If the cloned node is discovered, this step removes it from the network as soon as it is discovered.Nodes in the mobile computing environment interact with one another in a distributed fashion [24-26].If a node wishes to interact with the base station by transmitting the required data, the base station verifies the node’s authenticity by calculating its index using the hash function.If the calculated value of the node is the same as the original index value, the node is authenticated [27,28].If the value does not match, the node is not genuine and may be a clone node.In such a scenario, the receiver generates a warning message indicating that the sender node may be a clone node, followed by the termination of the cloned node [29,30]from the network, as shown in Fig.3:

?

5 Simulation Parameters

The proposed distributed technique DHFNA has been simulated on MATLAB using the parameters depicted in Tab.2 under different scenarios like, scenario 1, when the network has been attacked by the network with no detection technique implemented, scenario 2, when the proposed DHFNA has been implemented but there are no attacks in the network, scenario 3,when the proposed DHFNA has been implemented in the presence of attacks in the network.Following parameters have been considered in Tab.2 to carry out the same:

Figure 3: Steps for clone detection phase

6 Performance Evaluation

The performance of the DHFNA has been evaluated using the following parameters:

a.End to end delay: It refers to the transmission time from sender to receiver and is defined in below (4):

Table 2: Simulation parameters

Fig.4 depicts how the transmission rate changes in the three scenarios described above.It clearly shows that when the network has been attacked in the absence of any detection protocol,the average end-to-end delay is 0.8391, which is less than the end-to-end delay when the network has been attacked in the presence of DHFNA, which is equivalent to 3.92, and when the network has not been attacked but the protocol has been implemented, end-to-end delay comes out to be 3.75.When clone nodes are introduced into the network, they delay the real time of message delivery from sender to recipient while also causing additional packet losses.As a result, end-toend delays are unavoidable.

Figure 4: End to end delay

b.Packet loss:

It signifies the number of packets lost before reaching out to the target is the packet loss ratio depicted in Fig.5.The said result signifies that there are on an average 1949 packets lost in the case of a protocol implemented without attacks, on an average 331 packets are lost when the network has been attacked in the presence of DHFNA, and in the third scenario, where the network has been attacked in the absence of the proposed protocol, the average number of packets lost is 440.When clone nodes are available in the network, these nodes tend to behave as legitimate nodes and restrict sending data to the desired receiver, which eventually results in packet loss.

Figure 5: Packet loss in three scenarios

c.Packet Delivery Ratio:

It is the ratio of the number of packets sent by the source node to the number of packets received by the target node [31] as depicted in Fig.6.It has been calculated using (5):

The packet delivery ratio in scenario 1 when the network has been implemented with a protocol but attacks are not present, is 63% on an average, and this ratio is 83% in the case when the network has not been deployed with protocol but has been attacked, which is increased to 88% in case of implemented protocol along with attacks.The results signify that the delivery ratio improves with time when the DHFNA protocol has been implemented.

d.Energy consumption:

It refers to the amount of energy consumed during the entire process and is represented in Fig.7.The consumption of energy of a node in a mobile network is defined as the sum of the processor energy (EP), mobility energy (EMob), and transceiver energy (ETr) [16] which is represented in (6), where ECis defined as the total energy consumed and the energy of the processor is defined by (7) and where EPzstateis the processor state energy consumption and EPchangeis the energy consumed in state transition.Transceiver energy consumption is defined by (8):

Figure 6: : Packet delivery ratio

Figure 7: Residual energy in three scenarios

where ETsis the energy of transition state and ETcis the transition change energy consumed [32].Energy consumed while the nodes are in move i.e., in mobility is represented by (9) and where ec(Dsi,Tmi) is defined as the amount of energy consumed while the movement for a distance (Dsi)and in time (Tmi).Nodes in the mobile network tend to consume energy to perform all their operations like data transmission and computation, eventually which results in a decrease in the residual energy with time.

Values of Eqs.(6)-(8) have been merged and residual energy values have been obtained which depicts the residual energy in millijoules (mJ) left with each node after the end of simulation time.

The proposed work has been compared with the existing techniques in terms of memory and communication expenditure.To carry out the comparison, there is a need to calculate the consumption in the case of DHFNA.The comparison of all the available techniques has been tabulated in Tab.3.The cost required to carry out the node finding and saving operation using the double hashing technique gives an O(1) complexity in its best cases and average cases and an O(n) complexity in its worst case scenario.The best case is the scenario in which all the operations like searching for a node, removing and inserting a new node takes place with no collisions at all.The average case is the scenario in which all such operations are done with few collisions or probes.The worst case is the scenario in which all such operations are done with collisions in each step, mean probing is required for all the nodes.

Table 3: Comparison of DHFNA with other methods

Communication expenditure: it can be calculated using the summation of communication from source to reporter and from reporter to witness [33].This communication cost from source to reporting node can be calculated using the below mentioned (10) and communication cost from reporting node to witness node (WN)can be calculated using (11).Using (8) and (9), the total communication cost of one node can be calculated in (12).The total communication cost of the network will be calculated using (13) which is generated by multiplying the number of nodes (n)to (10) which gets reduced and the same has been depicted in Fig.8:

Figure 8: Communication cost

Figure 9: Memory cost comparison

Cost of memory consumed: Using the double hashing method, the memory cost per node is given and represented in Fig.9.The values in the table signify that the proposed DHFNA method gives on an average 17.56 memory cost which is far less than the existing methods.Detection rate of attacker nodes and detected nodes has been given as per the values depicted in Tab.4 and the details of the values used for the simulation of memory cost checking in all the existing methods have been tabulated in Tab.5.

Table 4: Detection rate of nodes

Table 5: Energy comparison

7 Conclusion

Mobile computing systems are susceptible to a wide range of attacks from attackers.The deployment of the network in an authentic manner is the most essential requirement for making the system fault-tolerant.Each node in this study’s network has been installed using the DHFNA method, which is responsible for authentication of the nodes in the network.Using double hashing, the first phase of this protocol is used to deploy nodes in the network, and the second phase is used to detect the existence of clone nodes in the network.If the cloned node is discovered,it is not permitted to stay on the network, and the base station and other nodes are alerted to its existence via the network’s security system.The clone node search is also carried out by the suggested work in the next phase.Evaluation results proves the performance of this approach is better in terms of communication and memory cost.

Funding Statement:The authors received no specific funding for this study.

Conflicts of Interest:The authors declare that they have no interest in reporting regarding the present study.

主站蜘蛛池模板: 亚洲视频影院| 美女裸体18禁网站| 国产福利观看| 喷潮白浆直流在线播放| 精品国产免费观看一区| 欧美三級片黃色三級片黃色1| 中国一级毛片免费观看| 2021天堂在线亚洲精品专区| 99视频只有精品| 日本不卡免费高清视频| 亚洲视屏在线观看| igao国产精品| 99爱在线| 亚洲无码不卡网| 美女免费精品高清毛片在线视| 亚洲一区二区黄色| 欧美伦理一区| 伦精品一区二区三区视频| 国产午夜精品鲁丝片| 为你提供最新久久精品久久综合| 亚洲成人黄色在线观看| 波多野结衣视频网站| 国产伦精品一区二区三区视频优播| 澳门av无码| 国模在线视频一区二区三区| 尤物亚洲最大AV无码网站| www.91中文字幕| 思思热在线视频精品| 亚洲欧美日韩中文字幕在线| аv天堂最新中文在线| 亚洲天堂自拍| 99视频精品全国免费品| 婷婷在线网站| 天天色综网| 亚洲国产成人精品青青草原| 亚洲精品视频免费观看| 欧美日在线观看| 一级看片免费视频| 国产主播喷水| 亚洲综合九九| 呦女亚洲一区精品| yy6080理论大片一级久久| 久草热视频在线| 欧美成人亚洲综合精品欧美激情| 18禁影院亚洲专区| 欧美伦理一区| 久久精品无码专区免费| 亚洲—日韩aV在线| 中文字幕无码中文字幕有码在线| 在线视频一区二区三区不卡| 亚洲性日韩精品一区二区| 精品久久久久久久久久久| 99精品欧美一区| 播五月综合| 久久特级毛片| 日韩国产欧美精品在线| 99精品热视频这里只有精品7| 一本大道无码日韩精品影视| 久久精品91麻豆| 国产真实乱子伦精品视手机观看 | 国产精品美乳| 小说 亚洲 无码 精品| 国产欧美日韩资源在线观看| 色婷婷视频在线| 1024你懂的国产精品| 手机在线免费不卡一区二| 一区二区三区成人| 东京热av无码电影一区二区| 亚洲AV免费一区二区三区| 在线不卡免费视频| 男女精品视频| 91精品国产福利| 欧美一级专区免费大片| 伊人狠狠丁香婷婷综合色| 日韩中文无码av超清| 欧美一级高清片欧美国产欧美| 成人福利在线观看| 福利国产在线| 四虎在线观看视频高清无码 | 国产AV无码专区亚洲精品网站| 国产成+人+综合+亚洲欧美| 亚洲精品无码久久久久苍井空|