An Image Hashing-Based Authentication and Secure Group Communication Scheme for IoT-Enabled MANETs

Mobile ad hoc networks (MANETs) play a highly significant role in the Internet of Things (IoT) for managing node mobility. MANET opens the pathway for different IoT-based communication systems with effective abilities for a variety of applications in several domains. In IoT-based systems, it provide...

Full description

Bibliographic Details
Main Author: Aiiad Albeshri
Format: Article
Language:English
Published: MDPI AG 2021-06-01
Series:Future Internet
Subjects:
Online Access:https://www.mdpi.com/1999-5903/13/7/166
_version_ 1827688637175693312
author Aiiad Albeshri
author_facet Aiiad Albeshri
author_sort Aiiad Albeshri
collection DOAJ
description Mobile ad hoc networks (MANETs) play a highly significant role in the Internet of Things (IoT) for managing node mobility. MANET opens the pathway for different IoT-based communication systems with effective abilities for a variety of applications in several domains. In IoT-based systems, it provides the self-formation and self-connection of networks. A key advantage of MANETs is that any device or node can freely join or leave the network; however, this makes the networks and applications vulnerable to security attacks. Thus, authentication plays an essential role in protecting the network or system from several security attacks. Consequently, secure communication is an important prerequisite for nodes in MANETs. The main problem is that the node moving from one group to another may be attacked on the way by misleading the device to join the neighboring group. To address this, in this paper, we present an authentication mechanism based on image hashing where the network administrator allows the crosschecking of the identity image of a soldier (i.e., a node) in the joining group. We propose the node joining and node migration algorithms where authentication is involved to ensure secure identification. The simulation tool NS-2 is employed to conduct extensive simulations for extracting the results from the trace files. The results demonstrate the effectiveness of the proposed scheme based on the memory storage communication overhead and computational cost. In our scheme, the attack can be detected effectively and also provides a highly robust assurance.
first_indexed 2024-03-10T10:00:30Z
format Article
id doaj.art-453545b9582e4d79b44f66d613d18737
institution Directory Open Access Journal
issn 1999-5903
language English
last_indexed 2024-03-10T10:00:30Z
publishDate 2021-06-01
publisher MDPI AG
record_format Article
series Future Internet
spelling doaj.art-453545b9582e4d79b44f66d613d187372023-11-22T01:57:39ZengMDPI AGFuture Internet1999-59032021-06-0113716610.3390/fi13070166An Image Hashing-Based Authentication and Secure Group Communication Scheme for IoT-Enabled MANETsAiiad Albeshri0Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 80221, Saudi ArabiaMobile ad hoc networks (MANETs) play a highly significant role in the Internet of Things (IoT) for managing node mobility. MANET opens the pathway for different IoT-based communication systems with effective abilities for a variety of applications in several domains. In IoT-based systems, it provides the self-formation and self-connection of networks. A key advantage of MANETs is that any device or node can freely join or leave the network; however, this makes the networks and applications vulnerable to security attacks. Thus, authentication plays an essential role in protecting the network or system from several security attacks. Consequently, secure communication is an important prerequisite for nodes in MANETs. The main problem is that the node moving from one group to another may be attacked on the way by misleading the device to join the neighboring group. To address this, in this paper, we present an authentication mechanism based on image hashing where the network administrator allows the crosschecking of the identity image of a soldier (i.e., a node) in the joining group. We propose the node joining and node migration algorithms where authentication is involved to ensure secure identification. The simulation tool NS-2 is employed to conduct extensive simulations for extracting the results from the trace files. The results demonstrate the effectiveness of the proposed scheme based on the memory storage communication overhead and computational cost. In our scheme, the attack can be detected effectively and also provides a highly robust assurance.https://www.mdpi.com/1999-5903/13/7/166MANETnode mobilitysecure communicationimage hashingclustered deployments
spellingShingle Aiiad Albeshri
An Image Hashing-Based Authentication and Secure Group Communication Scheme for IoT-Enabled MANETs
Future Internet
MANET
node mobility
secure communication
image hashing
clustered deployments
title An Image Hashing-Based Authentication and Secure Group Communication Scheme for IoT-Enabled MANETs
title_full An Image Hashing-Based Authentication and Secure Group Communication Scheme for IoT-Enabled MANETs
title_fullStr An Image Hashing-Based Authentication and Secure Group Communication Scheme for IoT-Enabled MANETs
title_full_unstemmed An Image Hashing-Based Authentication and Secure Group Communication Scheme for IoT-Enabled MANETs
title_short An Image Hashing-Based Authentication and Secure Group Communication Scheme for IoT-Enabled MANETs
title_sort image hashing based authentication and secure group communication scheme for iot enabled manets
topic MANET
node mobility
secure communication
image hashing
clustered deployments
url https://www.mdpi.com/1999-5903/13/7/166
work_keys_str_mv AT aiiadalbeshri animagehashingbasedauthenticationandsecuregroupcommunicationschemeforiotenabledmanets
AT aiiadalbeshri imagehashingbasedauthenticationandsecuregroupcommunicationschemeforiotenabledmanets