Enhanced security using multiple paths routine scheme in cloud-MANETs.

Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-organized mobile gadgets that can communicate with each other with no support from a central authority or infrastructure. The mai...

Full description

Bibliographic Details
Main Authors: Hai, Tao, Zhou, Jincheng, Lu, Ye, Jawawi, Dayang, Wang, Dan, Onyema, Edeh Michael, Biamba, Cresantus
Format: Article
Language:English
Published: Springer Science and Business Media Deutschland GmbH 2023
Subjects:
Online Access:http://eprints.utm.my/106407/1/TaoHai2023_EnhancedSecurityUsingMultiplePathsRoutine.pdf
_version_ 1811132332171591680
author Hai, Tao
Zhou, Jincheng
Lu, Ye
Jawawi, Dayang
Wang, Dan
Onyema, Edeh Michael
Biamba, Cresantus
author_facet Hai, Tao
Zhou, Jincheng
Lu, Ye
Jawawi, Dayang
Wang, Dan
Onyema, Edeh Michael
Biamba, Cresantus
author_sort Hai, Tao
collection ePrints
description Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-organized mobile gadgets that can communicate with each other with no support from a central authority or infrastructure. The main advantage of MANETs is its ability to manage mobility while data communication between different users in the system occurs. In MANETs, clustering is an active technique used to manage mobile nodes. The security of MANETs is a key aspect for the fundamental functionality of the network. Addressing the security-related problems ensures that the confidentiality and integrity of the data transmission is secure. MANETs are highly prone to attacks because of their properties.In clustering schemes, the network is broken down to sub-networks called clusters. These clusters can have overlapping nodes or be disjointed. An enhanced node referred to asthe Cluster Head (CH) is chosen from each set to overseetasks related to routing. It decreases the member nodes’ overhead and improvesthe performance of the system. The relationship between the nodes and CH may vary randomly, leading to re-associations and re-clustering in a MANET that is clustered. An efficient and effective routing protocol is required to allow networking and to find the most suitable paths between the nodes. The networking must be spontaneous, infrastructure-less, and provide end-to-end interactions. The aim of routing is the provision of maximum network load distribution and robust networks. This study focused on the creation of a maximal route between a pair of nodes, and to ensure the appropriate and accurate delivery of the packet. The proposed solution ensured that routing can be carried out with the lowest bandwidth consumption. Compared to existing protocols, the proposed solution had a control overhead of 24, packet delivery ratio of 81, the lowest average end-to-end delay of 6, and an improved throughput of 80,000, thereby enhancing the output of the network. Our result shows that multipath routing enables the network to identify alternate paths connecting the destination and source. Routing is required to conserve energy and for optimum bandwidth utilization.
first_indexed 2024-09-24T00:01:54Z
format Article
id utm.eprints-106407
institution Universiti Teknologi Malaysia - ePrints
language English
last_indexed 2024-09-24T00:01:54Z
publishDate 2023
publisher Springer Science and Business Media Deutschland GmbH
record_format dspace
spelling utm.eprints-1064072024-07-08T06:47:59Z http://eprints.utm.my/106407/ Enhanced security using multiple paths routine scheme in cloud-MANETs. Hai, Tao Zhou, Jincheng Lu, Ye Jawawi, Dayang Wang, Dan Onyema, Edeh Michael Biamba, Cresantus T58.6-58.62 Management information systems Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-organized mobile gadgets that can communicate with each other with no support from a central authority or infrastructure. The main advantage of MANETs is its ability to manage mobility while data communication between different users in the system occurs. In MANETs, clustering is an active technique used to manage mobile nodes. The security of MANETs is a key aspect for the fundamental functionality of the network. Addressing the security-related problems ensures that the confidentiality and integrity of the data transmission is secure. MANETs are highly prone to attacks because of their properties.In clustering schemes, the network is broken down to sub-networks called clusters. These clusters can have overlapping nodes or be disjointed. An enhanced node referred to asthe Cluster Head (CH) is chosen from each set to overseetasks related to routing. It decreases the member nodes’ overhead and improvesthe performance of the system. The relationship between the nodes and CH may vary randomly, leading to re-associations and re-clustering in a MANET that is clustered. An efficient and effective routing protocol is required to allow networking and to find the most suitable paths between the nodes. The networking must be spontaneous, infrastructure-less, and provide end-to-end interactions. The aim of routing is the provision of maximum network load distribution and robust networks. This study focused on the creation of a maximal route between a pair of nodes, and to ensure the appropriate and accurate delivery of the packet. The proposed solution ensured that routing can be carried out with the lowest bandwidth consumption. Compared to existing protocols, the proposed solution had a control overhead of 24, packet delivery ratio of 81, the lowest average end-to-end delay of 6, and an improved throughput of 80,000, thereby enhancing the output of the network. Our result shows that multipath routing enables the network to identify alternate paths connecting the destination and source. Routing is required to conserve energy and for optimum bandwidth utilization. Springer Science and Business Media Deutschland GmbH 2023-12 Article PeerReviewed application/pdf en http://eprints.utm.my/106407/1/TaoHai2023_EnhancedSecurityUsingMultiplePathsRoutine.pdf Hai, Tao and Zhou, Jincheng and Lu, Ye and Jawawi, Dayang and Wang, Dan and Onyema, Edeh Michael and Biamba, Cresantus (2023) Enhanced security using multiple paths routine scheme in cloud-MANETs. Journal of Cloud Computing, 12 (1). pp. 1-23. ISSN 2192-113X http://dx.doi.org/10.1186/s13677-023-00443-5 DOI: 10.1186/s13677-023-00443-5
spellingShingle T58.6-58.62 Management information systems
Hai, Tao
Zhou, Jincheng
Lu, Ye
Jawawi, Dayang
Wang, Dan
Onyema, Edeh Michael
Biamba, Cresantus
Enhanced security using multiple paths routine scheme in cloud-MANETs.
title Enhanced security using multiple paths routine scheme in cloud-MANETs.
title_full Enhanced security using multiple paths routine scheme in cloud-MANETs.
title_fullStr Enhanced security using multiple paths routine scheme in cloud-MANETs.
title_full_unstemmed Enhanced security using multiple paths routine scheme in cloud-MANETs.
title_short Enhanced security using multiple paths routine scheme in cloud-MANETs.
title_sort enhanced security using multiple paths routine scheme in cloud manets
topic T58.6-58.62 Management information systems
url http://eprints.utm.my/106407/1/TaoHai2023_EnhancedSecurityUsingMultiplePathsRoutine.pdf
work_keys_str_mv AT haitao enhancedsecurityusingmultiplepathsroutineschemeincloudmanets
AT zhoujincheng enhancedsecurityusingmultiplepathsroutineschemeincloudmanets
AT luye enhancedsecurityusingmultiplepathsroutineschemeincloudmanets
AT jawawidayang enhancedsecurityusingmultiplepathsroutineschemeincloudmanets
AT wangdan enhancedsecurityusingmultiplepathsroutineschemeincloudmanets
AT onyemaedehmichael enhancedsecurityusingmultiplepathsroutineschemeincloudmanets
AT biambacresantus enhancedsecurityusingmultiplepathsroutineschemeincloudmanets