A HYBRID APPROACH TOWARDS LOCALIZATION AND SECURITY IN WIRELESS NETWORKS.
- Faculty of Computer Science, Faculty of Computer Science, Pune, India.
- Masters in Computer ScienceMES College of Engineering, Pune, India.
- MES College of Engineering, Lakehead University. Thunderbay,Canada.
- Cite This Article as
- Corresponding Author
In the digital era of 21st Century, recent developments and advancements in fields of Wireless Networks and positioning technology have progressed tremendously to enhance the pervasive devices and applications. To overcome the limitations of GPS such as the need for line of sight, expensive at cost, low battery life and others of relevance, many researchers and wireless technology practitioners have devised several localization topologies based on the distance between the nodes in the network. Localization and Security play significant roles in modeling the Wireless Networks and preventing it from collateral data damage. Localization eases up the accessibility procedure by allowing the user to access its device from any remote location via internet connection without any distance limitation. Security in Wireless Networks avoids unauthorized usage of network and also prevents data leak. The previous systems deployed for localization and security suffered from poor computation speeds, high power usage, and weak authentication. In this research paper, we propose an empirical approach towards localization in Wireless Networks using a decentralized scheme based on matrix completion, MALL, which makes use of coordinates of nodes and distance between them to achieve efficient localization index. Since MALL believes in high complex optimization and low non-convex optimization, the computation of distances can be done at a faster pace. For security in Mobile Clouds, we have introduced a novel light weight authentication scheme called MDLA (Message Digest and Location-based Authentication) which is of paramount importance in mobile networks for authentication in message passing. SSH (Secure Shell) makes use of public key cryptosystem which leads to high-cost computation for mobile devices. MDLA involves symmetric key operations and the integrity of messages is preserved by hashing the information using message digest. The entire operation is catalyzed using time stamps, secret keys and Pseudo-Random Generator (PRGM). An in depth-analysis of MALL and MDLA with the end simulation implementations for both the approaches have been stated in the later part of the paper.
- Rallapalli, L. Qiu, Y. Zhang, and Y.C. Chen. Exploiting temporal stability and low-rank structure for localization in mobile networks. In Proc. of the sixteenth annual international conference on Mobile computing and networking, pages 161?172. ACM, 2010
- Rudafshani and S. Datta. Localization in wireless sensor networks. In Proc. of the 6th international conference on Information processing in sensor networks, pages 51?60. ACM, 2007.
- Hu and D. Evans. Localization for mobile sensor networks. In Proc. of the 10th annual international conference on Mobile computing and networking, pages 45?57. ACM, 2004.
- Recht, M. Fazel, and P.A. Parrilo. Guaranteed minimum-rank solutions of linear matrix equations via nuclear norm minimization. Society for Industrial and Applied Mathematics Review, 52(3):471?501, 2010
- M.Talib,R.Atan,R.Abdullah,and.Azrifah,?CloudZone:Towards an integrity layer of cloud data storage based on multi-agent system architecture,? 2011 IEEE Conference on Open Systems, pp. 127?132, Sep. 2011.
- Qiang Ye, Jie Cheng, Hongwie Du, Xiaohu Jia, Jing Zhang,?A Matrix Completion Approach to Mobile Network Localization?, ACM Digital Library, 2014
- Saurabh Dey, Srinivas Sampalli, Qiang Ye, ?A Light-weight Authentication Scheme Based on Message Digest and Location for Mobile Cloud Computing?, IEEE 2014. https://omnetpp.org/documentation/.
[Suraj balwan, mahesh malwade and ajinkya kunjir. (2018); A HYBRID APPROACH TOWARDS LOCALIZATION AND SECURITY IN WIRELESS NETWORKS. Int. J. of Adv. Res. 6 (12). 211-222] (ISSN 2320-5407). www.journalijar.com
Assistant Professor at MES College of Engineering, Pune, India
Article DOI: 10.21474/IJAR01/8133 DOI URL: http://dx.doi.org/10.21474/IJAR01/8133
Share this article
This work is licensed under a Creative Commons Attribution 4.0 International License.