A HYBRID APPROACH TOWARDS LOCALIZATION AND SECURITY IN WIRELESS NETWORKS
Journal: International Journal of Advanced Research (Vol.6, No. 12)Publication Date: 2018-12-01
Authors : Suraj balwan mahesh malwade; ajinkya kunjir.;
Page : 211-222
Keywords : Localization Wireless Networks Security Authentication Matrix Completion Message Digest.;
Abstract
In the digital era of 21st Century, recent developments and advancements in fields of Wireless Networks and positioning technology have progressed tremendously to enhance the pervasive devices and applications. To overcome the limitations of GPS such as the need for line of sight, expensive at cost, low battery life and others of relevance, many researchers and wireless technology practitioners have devised several localization topologies based on the distance between the nodes in the network. Localization and Security play significant roles in modeling the Wireless Networks and preventing it from collateral data damage. Localization eases up the accessibility procedure by allowing the user to access its device from any remote location via internet connection without any distance limitation. Security in Wireless Networks avoids unauthorized usage of network and also prevents data leak. The previous systems deployed for localization and security suffered from poor computation speeds, high power usage, and weak authentication. In this research paper, we propose an empirical approach towards localization in Wireless Networks using a decentralized scheme based on matrix completion, MALL, which makes use of coordinates of nodes and distance between them to achieve efficient localization index. Since MALL believes in high complex optimization and low non-convex optimization, the computation of distances can be done at a faster pace. For security in Mobile Clouds, we have introduced a novel light weight authentication scheme called MDLA (Message Digest and Location-based Authentication) which is of paramount importance in mobile networks for authentication in message passing. SSH (Secure Shell) makes use of public key cryptosystem which leads to high-cost computation for mobile devices. MDLA involves symmetric key operations and the integrity of messages is preserved by hashing the information using message digest. The entire operation is catalyzed using time stamps, secret keys and Pseudo-Random Generator (PRGM). An in depth-analysis of MALL and MDLA with the end simulation implementations for both the approaches have been stated in the later part of the paper.
Other Latest Articles
- STUDY OF CARDIOVASCULAR ENDURANCE IN NEWLY ADMITTED MEDICAL STUDENTS
- LOCAL CONTENT INITIATIVES AND LOCAL DEVELOPMENT: THE TRENDS AND CONSTRAINTS OF THE MINING SECTOR IN CAMEROON
- S-TIME-DISTANCE ? DUAL PARALLEL SYSTEM FOR ANALYSING INDICATORS EXAMPLE OF GENDER DIFFERENCES IN LIFE EXPECTANCY IN THE WORLD
- TOTAL PARATHROIDECTOMY WITH AUTOTRANSPLANTATION VERSUS SUBTOTAL PARATHYROIDECTOMY AS DIFFERENT MODALITIES IN MANAGEMENT OF SECONDARY HYPERPARATHYROIDISM
- CHRONIC PERIODONTITIS ASSOCIATED WITH CINNAMOMUN ZEYLANICUM INDUCED PLASMA CELL GINGIVITIS: A CASE REPORT
Last modified: 2019-01-16 15:38:24