An AACO Based Optimized SWiFi Network To Reduce Overheads
نویسندگان
چکیده
Nowadays the internet is Janus-faced with several challenges. Verifying data integrity and authentication are essential security services in order to secure data transmission process. Maintaining the security of your computer, network and private/sensitive data against unauthorized access and a wide variety of security threats without compromising the efficiency of the network can be challenging. The existing scheme enhance the data integrity, authentication and privacy depending on encryption/decryption methods by combining PGP, SWiFi and HMAC Systems in WiFi network but the efficiency of the system is reduced due to the overheads like delay, load etc. encountered during transmission. This research proposed a security technique to reduce the security risk across networks using PGP, sWiFi and HMAC systems with an efficient adaptive ant colony optimization (AACO) algorithm with uniform mutation operator using self-adaptive approach. Here mutation operator is used for enhancing the algorithm escape from local optima. The algorithm converges to the optimal final solution, by gathering the most effective sub-solutions where the probability of delay, load, retransmission attempts is very low and throughput is high. The proposed scheme gives better results than existing scheme as presented in results. The proposed technique is very complex for attackers to decode, and it is applicable to client-server architecture. The proposed system is expected to present, protect, and enhance the data integrity, authentication and privacy. Also, it improves the performance of the system. From the current study it may be concluded that the proposed system is more efficient than that of existing scheme. ________________________________________________________________________________________________________
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملLinear-Complexity Overhead-Optimized Random Linear Network Codes
Sparse random linear network coding (SRLNC) is an attractive technique proposed in the literature to reduce the decoding complexity of random linear network coding. Recognizing the fact that the existing SRLNC schemes are not efficient in terms of the required reception overhead, we consider the problem of designing overhead-optimized SRLNC schemes. To this end, we introduce a new design of SRL...
متن کاملEvaluation of Fault Handling of the Time-Triggered Architecture with Bus and Star Topology
Arbitrary faults of a single node in a time-triggered architecture (TTA) bus topology system may cause error propagation to correct nodes and may lead to inconsistent system states. This has been observed in validation work using software implemented fault injection (SWIFI) and heavy-ion fault injection techniques in a TTA cluster. In a TTA system, the membership and the clique avoidance algori...
متن کاملThe optimized model of factors effecting on the Merger and Acquisition from multiple dimensions with neural network approach.
Nowadays, firms apply the merger and acquisition strategy for gaining synergy, increasing the wealth of stockholders, economics of scales, enhancing efficiency, increasing the ability to research and develop, developing the firm and decreasing the risk. Developing an optimized model with the ability to identify the effective variables on the merger and acquisition process has a significant ...
متن کاملTopological considerations of ATM networks
The key to achieving universal network scalability is hierarchical organisation, where routing information is aggregated between levels in the hierarchy. This approach can considerably reduce the overheads due to storage, transfer and processing of routing information for large networks. Other benefits include increased security and ease of management of the network. Due to the high routing com...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017