scholarly journals SDVCA – A Robust and Secure Data Communication Protocol for Manet

Author(s):  
Anusha Kannan ◽  
Manikandan N ◽  
Mallikarjuna Nandi ◽  
Morsa Chaitanya ◽  
Chunduru Anilkumar

Abstract The existence of intruders is a threat factor in any network. Degradation of the network operation occur which include delay in transmission, reduced network energy level, low throughput and many. In heterogeneous networks, the threat is complex since it has several interconnected devices working with different operating systems. To solve the trust dispute in the network a Robust and Secure Data Communication Protocol for MANET termed as Software Defined networking enabled Virtual Certification Authority (SDVCA) is proposed. In MANET, the nodes forward information among them. To control the data flow in a MANET the network has to establish a controller node and forwarder nodes for transmitting or forwarding data. The forwarder node carries out the operation of router. The VCA provides authentication certificate for all the network nodes. Without this authentication, the node will be declared as an untrusted intruder. No data will be transferred to or through them. Hence a trusted network is formed and efficient safe data transfer is achieved. In the proposed scheme, the control logic of MANET is moved from forwarding plane (node) to control plane (node) for improving the network performance. A social network model in MANET is designed to create controller-based architecture. This controller node will function as a host and also as a pathway of connecting different social networks in MANET architecture. The results provide improved performances and the network has better throughput, and lesser end to end delay when compared with the existing techniques.

Author(s):  
Jakub Guziur ◽  
Michał Pawlak ◽  
Aneta Poniszewska-Marańda ◽  
Bartosz Wieczorek

Author(s):  
Amit Dengre ◽  
A.D. Gawande

The growth of high speed computer networks and that of the Internet, in particular, has increased the ease of Information Communication. Ironically, the cause for the development is also of the apprehension - use of digital formatted data. In comparison with Analog media, Digital media offers several distinct advantages such as high quality, easy editing, high fidelity copying, compression etc. But this type advancement in the field of data communication in other sense has hiked the fear of getting the data snooped at the time of sending it from the sender to the receiver. So, Information Security is becoming an inseparable part of Data Communication. In order to address this Information Security, Steganography plays an important role. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. In the current internet community, secure data transfer is limited due to its attack made on data communication. So more robust methods are chosen so that they ensure secured data transfer. One of the solutions which came to the rescue is the audio Steganography. But existing audio steganographic systems have poor interface, very low level implementation, difficult to understand and valid only for certain audio formats with restricted message size. Enhanced Audio Steganography (EAS) is one proposed system which is based on audio Steganography and cryptography & watermarking, ensures secure data transfer between the source and destination.


MANETs are vigorous network to obligate node links due to the wireless frequency affect the network performance. It evaluates the link constancy by redefining the link availability that connected throughout a specific time period. MANETs have an identical status to acquaintance by the node resources with any other network. In this work, network is able to deal with vital reform that competent, consistent, and accessible network to perform enhance network protocol along with data security. AODV network nodes need connections broadcast forward the message that requested a connection that create a series of impermanent routes back to the requesting node. In this work, a link state protocol is calculated an alternative and fragmented path from source to destination by re-routing traffic through it, regardless of the locations of failure and the number of failed links. Also, the purpose of this research work is to provide secure bit data networking and occupy bit-memory address to enhance the node data capacity size, hence it reduces packets loss, delay time, and improve throughput when re-join the nodes while failure. OLSR generate a control overhead to maintain routing table to consume data traffic bandwidth. This study reduces the control overhead to improve the performance of OLSR by optimizing control messages intervals to have enhanced and secure data transmission. In this work, a secure and reliable bitdata is presented which have a memory address search process between two data address as simulated in this work.


2012 ◽  
Vol 3 (3) ◽  
pp. 368-374
Author(s):  
Usha Kumari ◽  
Udai Shankar

IEEE 802.16 based wireless mesh networks (WMNs) are a promising broadband access solution to support flexibility, cost effectiveness and fast deployment of the fourth generation infrastructure based wireless networks. Reducing the time for channel establishment is critical for low latency/interactive Applications. According to IEEE 802.16 MAC protocol, there are three scheduling algorithms for assigning TDMA slots to each network node: centralized and distributed the distributed is further divided into two operational modes coordinated distributed and uncoordinated distributed. In coordinated distributed scheduling algorithm, network nodes have to transmit scheduling message in order to inform other nodes about their transfer schedule. In this paper a new approach is proposed to improve coordinated distributed scheduling efficiency in IEEE 802.16 mesh mode, with respect to three parameter Throughput, Average end to end delay and Normalized Overhead. For evaluating the proposed networks efficiency, several extensive simulations are performed in various network configurations and the most important system parameters which affect the network performance are analyzed


2019 ◽  
Vol 0 (0) ◽  
Author(s):  
Yassine Khlifi ◽  
Majid Alotaibi

AbstractOptical label switching is introduced for ensuring fast data transfer, quality of service (QoS) support, and better resource management. However, the important issue is how to optimize resource usage and satisfy traffic constraints for improving network performance and design. This paper proposes a dynamic approach that optimizes the resource in terms of link capacity and FDL (fiber delay line) buffering as well as a wavelength converter. The proposed approach decreases the resources usage and guarantees QoS support for various traffic demands. The optimization strategy consists of two stages: path building and traffic management. The path building assures logical topology making using the cumulative cost of available resource and traffic requirements including unicast and multicast. The traffic management solves the resource formulation problem during the traffic transfer by guaranteeing the required loss and blocking delay. Simulation work is conducted for validating the proposed approach and evaluating its performances and effectiveness. Simulation results show that our proposal minimizes effectively the use of link capacity of lightpath and light-tree. Moreover, our approach optimizes the use of buffering capacity and wavelength converter and guarantees QoS support according to traffic requirements.


OP-Journal ◽  
2021 ◽  
Author(s):  
Genevieve Westacott ◽  
Kirsten Vallmurr ◽  
Michael Schütz

AbstractData transfer has been forced to evolve as digital technologies are implemented throughout various aspects of the healthcare system. Despite the uniqueness of both the geography and the population of Queensland, information exchange and data communication has continued to follow this evolutionary trend. There have been a number of different health reforms designed to integrate digital innovations and allow critical data and information to be shared with the appropriate health professionals when necessary. Strict healthcare legislation has been navigated and to provide newly upgraded technologies and processes while maintaining privacy, confidentiality and security standards. A large portion of the digital revolution has been the implementation of the national run project, the My Health Record and the state run project, the Integrated Electronic Medical Record. Both are platforms that allow secure information exchange allowing patients to have improved quality of care. To maintain the steady progress, both the state and federal governments have developed strategies and visions to help provide guidance and direct for ongoing and future digital projects. They also outline areas that require further advancements to ensure Queensland is delivering equitable, high quality healthcare.


2021 ◽  
Vol 174 ◽  
pp. 1-12
Author(s):  
Hui Xie ◽  
Zhengyuan Zhang ◽  
Qi Zhang ◽  
Shengjun Wei ◽  
Changzhen Hu

2015 ◽  
Vol 8 (1) ◽  
pp. 17 ◽  
Author(s):  
R. Valarmathi ◽  
G. M. Kadhar Nawaz

Sign in / Sign up

Export Citation Format

Share Document