ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A HYBRID APPROACH TOWARDS LOCALIZATION AND SECURITY IN WIRELESS NETWORKS

Journal: International Journal of Advanced Research (Vol.6, No. 12)

Publication Date:

Authors : ; ;

Page : 211-222

Keywords : Localization Wireless Networks Security Authentication Matrix Completion Message Digest.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In the digital era of 21st Century, recent developments and advancements in fields of Wireless Networks and positioning technology have progressed tremendously to enhance the pervasive devices and applications. To overcome the limitations of GPS such as the need for line of sight, expensive at cost, low battery life and others of relevance, many researchers and wireless technology practitioners have devised several localization topologies based on the distance between the nodes in the network. Localization and Security play significant roles in modeling the Wireless Networks and preventing it from collateral data damage. Localization eases up the accessibility procedure by allowing the user to access its device from any remote location via internet connection without any distance limitation. Security in Wireless Networks avoids unauthorized usage of network and also prevents data leak. The previous systems deployed for localization and security suffered from poor computation speeds, high power usage, and weak authentication. In this research paper, we propose an empirical approach towards localization in Wireless Networks using a decentralized scheme based on matrix completion, MALL, which makes use of coordinates of nodes and distance between them to achieve efficient localization index. Since MALL believes in high complex optimization and low non-convex optimization, the computation of distances can be done at a faster pace. For security in Mobile Clouds, we have introduced a novel light weight authentication scheme called MDLA (Message Digest and Location-based Authentication) which is of paramount importance in mobile networks for authentication in message passing. SSH (Secure Shell) makes use of public key cryptosystem which leads to high-cost computation for mobile devices. MDLA involves symmetric key operations and the integrity of messages is preserved by hashing the information using message digest. The entire operation is catalyzed using time stamps, secret keys and Pseudo-Random Generator (PRGM). An in depth-analysis of MALL and MDLA with the end simulation implementations for both the approaches have been stated in the later part of the paper.

Last modified: 2019-01-16 15:38:24