An Image Hashing-Based Authentication and Secure Group Communication Scheme for IoT-Enabled MANETs
نویسندگان
چکیده
Mobile ad hoc networks (MANETs) play a highly significant role in the Internet of Things (IoT) for managing node mobility. MANET opens pathway different IoT-based communication systems with effective abilities variety applications several domains. In systems, it provides self-formation and self-connection networks. A key advantage MANETs is that any device or can freely join leave network; however, this makes vulnerable to security attacks. Thus, authentication plays an essential protecting network system from Consequently, secure important prerequisite nodes MANETs. The main problem moving one group another may be attacked on way by misleading neighboring group. To address this, paper, we present mechanism based image hashing where administrator allows crosschecking identity soldier (i.e., node) joining We propose migration algorithms involved ensure identification. simulation tool NS-2 employed conduct extensive simulations extracting results trace files. demonstrate effectiveness proposed scheme memory storage overhead computational cost. our scheme, attack detected effectively also robust assurance.
منابع مشابه
Image authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملimage authentication using lbp-based perceptual image hashing
feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of local binary pattern features. in this paper, we investigate the use of local binary patterns for percep...
متن کاملAGPM: An Authenticated Secure Group Communication Protocol for MANETs
Secure group communication is a challenging task with respect to MANET’s, authentication of mobile nodes, group key establishment and rekeying for secure information exchange and QoS in data transfer. In this paper we authenticate the mobile nodes through transitive signature scheme in the routing phase of AODV protocol. For a secure group communication we establish a collaborative group key wi...
متن کاملAn Authenticated Transitive-Closure Scheme for Secure Group Communication in MANETS
It is essential to provide authentication on mobile nodes in group communication to ensure security and privacy. The nodes that are interested in participating in the group communication form Graphs (V, E). In this paper we authenticate the mobile nodes through transitive closure property of the graph in the routing phase of the On Demand Multicast Routing Protocol (ODMRP) that forms Transitive...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Future Internet
سال: 2021
ISSN: ['1999-5903']
DOI: https://doi.org/10.3390/fi13070166