Improvement in Quality of Service Against Doppelganger Attacks for Connected Network

Because they are in a high-risk location, remote sensors are vulnerable to malicious ambushes. A doppelganger attack, in which a malicious hub impersonates a legitimate network junction and then attempts to take control of the entire network, is one of the deadliest types of ambushes. Because remote...

Full description

Bibliographic Details
Main Authors: Deepak Choudhary, Roop Pahuja
Format: Article
Language:English
Published: Universidad Internacional de La Rioja (UNIR) 2022-09-01
Series:International Journal of Interactive Multimedia and Artificial Intelligence
Subjects:
Online Access:https://www.ijimai.org/journal/bibcite/reference/3151
_version_ 1811209319808499712
author Deepak Choudhary
Roop Pahuja
author_facet Deepak Choudhary
Roop Pahuja
author_sort Deepak Choudhary
collection DOAJ
description Because they are in a high-risk location, remote sensors are vulnerable to malicious ambushes. A doppelganger attack, in which a malicious hub impersonates a legitimate network junction and then attempts to take control of the entire network, is one of the deadliest types of ambushes. Because remote sensor networks are portable, hub doppelganger ambushes are particularly ineffective in astute wellness contexts. Keeping the framework safe from hostile hubs is critical because the information in intelligent health frameworks is so sensitive. This paper developed a new Steering Convention for Vitality Effective Systems (SC-VFS) technique for detecting doppelganger attacks in IoT-based intelligent health applications such as a green corridor for transplant pushback. This method's main advantage is that it improves vitality proficiency, a critical constraint in WSN frameworks. To emphasize the suggested scheme's execution, latency, remaining vitality, throughput, vitality effectiveness, and blunder rate are all used. To see how proper the underutilized technique is compared to the existing Half Breed Multi-Level Clustering (HMLC) computation. The suggested approach yields latency of 0.63ms and 0.6ms, respectively, when using dead hubs and keeping a strategic distance from doppelganger assault. Furthermore, during the 2500 cycles, the suggested system achieves the highest remaining vitality of 49.5J.
first_indexed 2024-04-12T04:37:27Z
format Article
id doaj.art-fadfc6ff8696474380387edba948df36
institution Directory Open Access Journal
issn 1989-1660
language English
last_indexed 2024-04-12T04:37:27Z
publishDate 2022-09-01
publisher Universidad Internacional de La Rioja (UNIR)
record_format Article
series International Journal of Interactive Multimedia and Artificial Intelligence
spelling doaj.art-fadfc6ff8696474380387edba948df362022-12-22T03:47:46ZengUniversidad Internacional de La Rioja (UNIR)International Journal of Interactive Multimedia and Artificial Intelligence1989-16602022-09-0175515810.9781/ijimai.2022.08.003ijimai.2022.08.003Improvement in Quality of Service Against Doppelganger Attacks for Connected NetworkDeepak ChoudharyRoop PahujaBecause they are in a high-risk location, remote sensors are vulnerable to malicious ambushes. A doppelganger attack, in which a malicious hub impersonates a legitimate network junction and then attempts to take control of the entire network, is one of the deadliest types of ambushes. Because remote sensor networks are portable, hub doppelganger ambushes are particularly ineffective in astute wellness contexts. Keeping the framework safe from hostile hubs is critical because the information in intelligent health frameworks is so sensitive. This paper developed a new Steering Convention for Vitality Effective Systems (SC-VFS) technique for detecting doppelganger attacks in IoT-based intelligent health applications such as a green corridor for transplant pushback. This method's main advantage is that it improves vitality proficiency, a critical constraint in WSN frameworks. To emphasize the suggested scheme's execution, latency, remaining vitality, throughput, vitality effectiveness, and blunder rate are all used. To see how proper the underutilized technique is compared to the existing Half Breed Multi-Level Clustering (HMLC) computation. The suggested approach yields latency of 0.63ms and 0.6ms, respectively, when using dead hubs and keeping a strategic distance from doppelganger assault. Furthermore, during the 2500 cycles, the suggested system achieves the highest remaining vitality of 49.5J.https://www.ijimai.org/journal/bibcite/reference/3151controllerdoppelgangerremote configurationsecuritytransportationinternet of things
spellingShingle Deepak Choudhary
Roop Pahuja
Improvement in Quality of Service Against Doppelganger Attacks for Connected Network
International Journal of Interactive Multimedia and Artificial Intelligence
controller
doppelganger
remote configuration
security
transportation
internet of things
title Improvement in Quality of Service Against Doppelganger Attacks for Connected Network
title_full Improvement in Quality of Service Against Doppelganger Attacks for Connected Network
title_fullStr Improvement in Quality of Service Against Doppelganger Attacks for Connected Network
title_full_unstemmed Improvement in Quality of Service Against Doppelganger Attacks for Connected Network
title_short Improvement in Quality of Service Against Doppelganger Attacks for Connected Network
title_sort improvement in quality of service against doppelganger attacks for connected network
topic controller
doppelganger
remote configuration
security
transportation
internet of things
url https://www.ijimai.org/journal/bibcite/reference/3151
work_keys_str_mv AT deepakchoudhary improvementinqualityofserviceagainstdoppelgangerattacksforconnectednetwork
AT rooppahuja improvementinqualityofserviceagainstdoppelgangerattacksforconnectednetwork