Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

An Efficient Unique Tokenized Authentication Technique Based Data Offloading Approach Using Key Exchange to Maintain Data Integrity in Heterogeneous Networks

Published: 09 September 2023 Publication History

Abstract

In the current period, the number of mobile users is rapidly expanding with a complicated network setup with a large amount of network traffic, which results in data overload. Insufficient network bandwidth causes data overloading. Data overloading can be mitigated by implementing a potential solution to deal with the massive network traffic. Despite the fact that the capabilities of mobile networks are rapidly expanding, the aforementioned issue persists as we move from cellular to advanced wireless networks. To keep up with the ever-increasing number of internet users, offloading techniques have become increasingly popular in mobile computing. As the number of users and the volume of data they generate grows, the network’s capacity is taxed, and this is where offloading techniques come in to help. However, in many situations, authentication is absolutely necessary for the formation of a connection. As a result, the study presents a data offloading method for mobile computing that is both safe and cost-effective, as well as successful in managing network traffic. Individuals’ personal information might also constitute a severe privacy risk to users. Anticipating the legitimacy of the nodes and secret key negotiation helps avoid these dangers. Developing a mutual authentication and secret key exchange system for resource-constrained networks that is secure and private in all ways is a difficult challenge. Integrate key exchange authentication with an efficient data offloading approach to maintain data confidentiality and integrity in the whole network during transmission is the primary goal of the research. This research presents a Unique Tokenized Authentication Technique based Data Offloading approach using Key Exchange (UTAT-DO-KE) model is proposed in this research for maintaining data integrity in heterogeneous networks during data communication. In this case, performance analysis can be done to lower the time it takes to authenticate and run the application. When compared to the current procedures, the proposed model will improve network performance while simultaneously reducing data traffic.

References

[1]
Borse Y and Siddavatam I A novel secure remote user authentication protocol using three factors Int J Comput Appl 2014 87 17 1-6
[2]
Pandya D, Narayan R, Thakkar S, Madhekar T, and Thakare B An overview of various authentication methods and protocols Int J Comput Appl 2015 131 9 25-27
[3]
Baqer K, Bezuidenhoudt J, Anderson R, Kuhn M. SMAPs: short message authentication protocols. 2017. p. 119–32.
[4]
Mitchell JC, Roy A, Rowe P, Scedrov A. Analysis of EAP-GPSK authentication protocol. In: International conference on applied cryptography and network security. 2008. p. 309–27.
[5]
Du LP, Weiguo J, and Li Y Research on micro-certificate based security system for internet of things Appl Mech Mater 2013 263 3125-3129
[6]
Fatangare S and Lomte A SWAP: secure web authentication protocol on windows mobile app Int J Comput Sci Mob Comput 2014 3 6 674-680
[7]
Pacyna P, Chrabąszcz R. Evaluation of EAP re-authentication protocol. In: 17th International telecommunications network strategy and planning symposium (Networks), Montreal; 2016. p. 45–9.
[8]
Bhatele K, Sinhal A, Pathak M. A novel approach to the design of a new hybrid security protocol architecture. In: IEEE international conference on advanced communication control and computing technologies (ICACCCT), Ramanathapuram; 2012. p. 429–33.
[9]
Liu X, Liu J, Chang G. nPAKE: an improved group PAKE protocol. In: IEEE ninth web information systems and applications conference; 2012.
[10]
Shojaie B, Saberi I, Salleh M, Niknafskermani M, Alavi SM. Improving EAP-TLS performance using cryptographic methods. In: International conference on computer & Information Science; 2012.
[11]
Asokan N, Niemi V, Nyberg K. Man-in-the middle in tunneled authentication protocols. Nokia Research Centre, Finland; 2002.
[12]
Kumar U, Kumar P, and Gambhir S Analysis and literature review of IEEE 802.1x(Authentication) protocols Int J Eng Adv Technol 2014 3 5 163-168
[13]
Kumar U, Gambhir S. Secured authentication method for wireless networks. IOSR J Comput Eng. 2015;1–11.
[14]
Cao W, Feng G, Qin S, and Yan M Cellular offloading in heterogeneous mobile networks with D2D communication assistance IEEE Trans Veh Technol 2017 66 5 4245-4255
[15]
Mao G, Zhang Z, and Anderson BDO Cooperative content dissemination and offloading in heterogeneous mobile networks IEEE Trans Veh Technol 2016 65 8 6573-6587
[16]
Cisco visual networking index: global mobile data traffic forecast update, 2016–2021 white paper. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/mobile-white-paper-c11-520862.html.
[17]
Li Y, Jin D, Pan H, and Chen S Contact-aware data replication in roadside unit aided vehicular delay tolerant networks IEEE Trans Mob Comput 2016 15 2 306-321
[18]
Gozálvez J, Sepulcre M, and Bauza R IEEE 802.11 p vehicle to infrastructure communications in urban environments IEEE Commun Mag 2012 50 5 176-183
[19]
Chuang Y-J, Lin KC-J. Cellular traffic offloading through community-based opportunistic dissemination. In: 2012 IEEE wireless communications and networking conference (WCNC), Paris; 2012. p. 3188–93.
[20]
Kashihara S, Sanadidi M, Gerla M. Mobile, personal data offloading to public transport vehicles. In: Proceedings of the 2012 IEEE international conference on mobile computing and ubiquitous networking (ICMU), Okinawa; 2012. p. 142–7.
[21]
Hawbani A, Torbosh E, Xingfu W, Sincak P, Zhao L, and Al-Dubai AY Fuzzy based distributed protocol for vehicle to vehicle communication IEEE Trans Fuzzy Syst 2019 29 612-626
[22]
Han B and Pan H Mobile data offloading through opportunistic communications and social participation IEEE Trans Mob Comput 2012 11 5 821-834
[23]
Go Y, Moon YG, Nam G, Park KS. A disruption-tolerant transmission protocol for practical mobile data offloading. In: Proceedings of the third ACM international workshop on mobile opportunistic networks-MobiOpp '12, Zürich; 2012. p. 61–8.
[24]
Li X, Cheng Z, Bo G, Yamori K, and Tanaka Y Optimal pricing and service selection in the mobile cloud architectures IEEE Access 2019 7 43564-43572
[25]
Chen S, Hu J, Shi Y, and Zhao L LTE-V: a TD-LTE-based V2X solution for future vehicular network IEEE Internet Things J 2016 3 6 997-1005

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image SN Computer Science
SN Computer Science  Volume 4, Issue 5
Jun 2023
3596 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 09 September 2023
Accepted: 06 June 2023
Received: 06 March 2023

Author Tags

  1. Data offloading
  2. Data overloading
  3. Network traffic
  4. Data integrity
  5. Unique token
  6. Key exchange

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media