Open Access iconOpen Access

ARTICLE

crossmark

Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node

by Neha Malhotra1,2,*, Manju Bala3

1 I.K.Gujral Punjab Technical University, Kapurthala, 144603, India
2 Lovely Professional University, Phagwara, 144411, India
3 Khalsa College of Engineering and Technology, Amritsar, 143001, India

* Corresponding Author: Neha Malhotra. Email: email

(This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)

Computers, Materials & Continua 2022, 70(3), 5269-5284. https://doi.org/10.32604/cmc.2022.020920

Abstract

Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility. In such attacks, an adversary accesses a few network nodes, generates replication, then inserts this replication into the network, potentially resulting in numerous internal network attacks. Most existing techniques use a central base station, which introduces several difficulties into the system due to the network's reliance on a single point, while other ways generate more overhead while jeopardising network lifetime. In this research, an intelligent double hashing-based clone node identification scheme was used, which reduces communication and memory costs while performing the clone detection procedure. The approach works in two stages: in the first, the network is deployed using an intelligent double hashing procedure to avoid any network collisions and then in the second, the clone node identification procedure searches for any clone node in the network. This first phase verifies the node prior to network deployment, and then, whenever a node wants to interact, it executes the second level of authentication. End-to-end delay, which is bound to increase owing to the injection of clone nodes, and packet loss, which is reduced by the double hashing technique, were used to evaluate the performance of the aforementioned approach.

Keywords


Cite This Article

APA Style
Malhotra, N., Bala, M. (2022). Intelligent multilevel node authentication in mobile computing using clone node. Computers, Materials & Continua, 70(3), 5269-5284. https://doi.org/10.32604/cmc.2022.020920
Vancouver Style
Malhotra N, Bala M. Intelligent multilevel node authentication in mobile computing using clone node. Comput Mater Contin. 2022;70(3):5269-5284 https://doi.org/10.32604/cmc.2022.020920
IEEE Style
N. Malhotra and M. Bala, “Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node,” Comput. Mater. Contin., vol. 70, no. 3, pp. 5269-5284, 2022. https://doi.org/10.32604/cmc.2022.020920



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1781

    View

  • 1130

    Download

  • 0

    Like

Share Link