期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node
1
作者 Neha Malhotra Manju Bala 《Computers, Materials & Continua》 SCIE EI 2022年第3期5269-5284,共16页
Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility.In such attacks,an adversary accesses a few network nodes,generates replication,then inserts this replication into the network,p... Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility.In such attacks,an adversary accesses a few network nodes,generates replication,then inserts this replication into the network,potentially resulting in numerous internal network attacks.Most existing techniques use a central base station,which introduces several difficulties into the system due to the network’s reliance on a single point,while other ways generate more overhead while jeopardising network lifetime.In this research,an intelligent double hashing-based clone node identification scheme was used,which reduces communication and memory costs while performing the clone detection procedure.The approach works in two stages:in the first,the network is deployed using an intelligent double hashing procedure to avoid any network collisions and then in the second,the clone node identification procedure searches for any clone node in the network.This first phase verifies the node prior to network deployment,and then,whenever a node wants to interact,it executes the second level of authentication.End-to-end delay,which is bound to increase owing to the injection of clone nodes,and packet loss,which is reduced by the double hashing technique,were used to evaluate the performance of the aforementioned approach. 展开更多
关键词 Node authentication clone node mobile computing double hashing fault tolerance
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部