Inicio  /  Future Internet  /  Vol: 13 Par: 7 (2021)  /  Artículo
ARTÍCULO
TITULO

An Image Hashing-Based Authentication and Secure Group Communication Scheme for IoT-Enabled MANETs

Aiiad Albeshri    

Resumen

Mobile ad hoc networks (MANETs) play a highly significant role in the Internet of Things (IoT) for managing node mobility. MANET opens the pathway for different IoT-based communication systems with effective abilities for a variety of applications in several domains. In IoT-based systems, it provides the self-formation and self-connection of networks. A key advantage of MANETs is that any device or node can freely join or leave the network; however, this makes the networks and applications vulnerable to security attacks. Thus, authentication plays an essential role in protecting the network or system from several security attacks. Consequently, secure communication is an important prerequisite for nodes in MANETs. The main problem is that the node moving from one group to another may be attacked on the way by misleading the device to join the neighboring group. To address this, in this paper, we present an authentication mechanism based on image hashing where the network administrator allows the crosschecking of the identity image of a soldier (i.e., a node) in the joining group. We propose the node joining and node migration algorithms where authentication is involved to ensure secure identification. The simulation tool NS-2 is employed to conduct extensive simulations for extracting the results from the trace files. The results demonstrate the effectiveness of the proposed scheme based on the memory storage communication overhead and computational cost. In our scheme, the attack can be detected effectively and also provides a highly robust assurance.

 Artículos similares

       
 
Yong Xu, Hong Ni and Xiaoyong Zhu    
Information-Centric Networking (ICN) has revolutionized the manner of content acquisition by shifting the communication mode from host-centric to information-centric. Considering the existing, large amount of IP infrastructure in current networks, the ne... ver más
Revista: Future Internet

 
Zhiyuan Wang, Hong Ni and Rui Han    
As the Internet communication model changes from host-centric to content-centric, information-centric networking (ICN) as a new network architecture has received increasing attention. There are often multiple replicas of content in ICN, and how to reason... ver más
Revista: Future Internet

 
A. F. M. Shahen Shah    
Unmanned aerial vehicles (UAVs) are valued in 5G and 6G networks due to their communication capabilities, low cost, and flexible deployment. Recently, UAV-aided emergency networks in disasters have been designed where one single large UAV is used. Compar... ver más
Revista: Drones

 
Ke Zhao, Rui Han and Xu Wang    
The fifth-generation communication technology (5G) and information-centric networks (ICNs) are acquiring more and more attention. Cache plays a significant part in the 5G-ICN architecture that the industry has suggested. 5G mobile terminals switch betwee... ver más
Revista: Future Internet

 
Widya Nita Suliyanti and Riri Fitri Sari    
A Practical Byzantine Fault Tolerance (PBFT) is a consensus algorithm deployed in a consortium blockchain that connects a group of related participants. This type of blockchain suits the implementation of the Building Information Modeling (BIM) informati... ver más