Abstract
Wireless technology has consistently been a popular resolution for handling the growing demand of data receiving in mobile linkages as the availability of high-speed internet is increasing rapidly. Although, the legacy of such technology shortages of seamless inter-communication amid the wireless link as well as mobile cellular linkages on one individual pointer as well as among the wireless hotspots conversely. Subsequently, data confidentiality and integrity are also primary concerns in data transmission through any network. There can be various weak and strong hotspots, since it is also possible to have fake hotspot in any network. A number of researches have been conducted to ensure data security by selecting the strong and authentic hotspot in wireless network infrastructure. However, the present literature fails to offer any security mechanism that can select the strongest, authentic hotspot and secure data confidentiality as well as integrity at the same time. Hence, this research aims to build an integrated technique that can offer adequate level of data confidentiality and integrity along with the selection of a strongest and most authentic hotspot. The proposed integrated technique comprises a unique hotspot selection and a SDES-based authentication mechanism to establish a secure communication link by picking the strongest hotspot. It encrypts the input data with SDES to assure confidentiality and uses an idle error checking technique with a backup scheme for fortuitous information loss to protect data integrity during transmission. The experimental results show its superiority over other existing techniques by improving QoE demands and fairness matrices. It offers higher avalanche effect and entropy values which justify its capacity to offer adequate data confidentiality. The capacity to offer lower percentage of information loss proves its efficiency in offering data integrity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Louta, M., Zournatzis, P., Kraounakis, S., Sarigiannidis, P., & Demetropoulos, I. (2011). Towards realization of the ABC vision: A comparative survey of access network selection. In 2011 IEEE Symposium on Computers and Communications (ISCC) (pp. 472–477), June 28–July 1, 2011.
Zhihong, L., Yaping, L., Zhenghu, G., & Lin, C. (2011). A Muti-rate access point selection policy in IEEE 802.11 WLANs. In 2011 International Conference on Multimedia Technology (ICMT) (pp. 63–67), July 26–28, 2011.
Bennai, M., Sydor, J., & Rahman, M. (2010). Automatic channel selection for cognitive radio systems. In 2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC) (pp. 1831–1835), September 26–30, 2010.
Tuysuz, M. F., & Mantar, H. A. (2010). Access point selection and reducing the handoff latency to support VoIP traffic. In 2010 International Conference on Computer Engineering and Systems (ICCES) (pp. 58–63), November 30–December 2, 2010.
Gharsellaoui, A., Chahine, M. K., & Mazzini, G. (2011). Optimizing access point selection in wireless local area networks. In 2011 International Conference on Communications and Information Technology (ICCIT) (pp. 47–52), March 29–31, 2011.
Mingyi, H., Garcia, A., & Barrera, J. (2011). Joint distributed access point selection and power allocation in cognitive radio networks. In INFOCOM, 2011 Proceedings (pp. 2516–2524). IEEE, April 10–15, 2011.
Balachandran, K., Kang, J. H., Karakayali, K., & Rege, K. (2011). Cell selection with downlink resource partitioning in heterogeneous networks. In 2011 IEEE International Conference on Communications Workshops (ICC) (pp. 1–6), June 5–9, 2011.
Haoxuan, M., Zhanbin, W., Jingcheng, W., Langwen, Z., & Liu, Z. (2014). A novel access point selection strategy for indoor location with Wi-Fi. In The 26th Chinese Control and Decision Conference (2014 CCDC) (pp. 5260–5265), May 31–June 2, 2014.
Yaqing, Z., & Sampalli, S. (2010). Client-based intrusion prevention system for 802.11 wireless LANs. In 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (pp. 100–107), October 11–13, 2010.
Choi, J., Chang, S.-Y., Diko, K., & Hu, Y.-C. (2011). Secure MAC-layer protocol for captive portals in wireless hotspots. In 2011 IEEE International Conference on Communications (ICC) (pp. 1–5), June 5–9, 2011.
Chew, C. C., Funabiki, N., & Fujita, S. (2014). Extensions of active access-point selection algorithm for wireless mesh networks using IEEE802.11ac Protocol. In 2014 Second International Symposium on Computing and Networking (CANDAR) (pp. 310–314), December 10–12, 2014.
Ruikai, M., Nguyen, D. H. N., & Tho, L.-N. (2015). Joint access point selection and linear precoding game for MIMO multiple-access channels. In Wireless Communications and Networking Conference (WCNC) (pp. 753–758). IEEE, March 9–12, 2015.
Chauhan, N., & Yadav, R. K. (2012). Security analysis of identity based cryptography and certificate based in wimax network using Omnet++ simulator. In 2012 Second International Conference onAdvanced Computing & Communication Technologies (ACCT) (pp. 509–512), January 7–8, 2012.
Soon, K. H., Kim, E., & Hwangnam, K. (2012). QoE-driven Wi-Fi selection mechanism for next generation smartphones. In 2012 First IEEE Workshop on Enabling Technologies for Smartphone and Internet of Things (ETSIoT) (pp. 13–18), June 18, 2012.
Corena, J. C., & Ohtsuki, T. (2012). A Multiple-MAC-based protocol to identify misbehaving nodes in network coding. In Vehicular Technology Conference (VTC Fall) (pp. 1–5), September 3–6, 2012.
Yi, X., Chen, N., Jia, Z., & Chen, X. (2010). Trusted communication system based on RSA authentication. In 2010 Second International Workshop on Education Technology and Computer Science (IEEE) (pp. 329–332).
Weixin, B., Luo, Y., Xu, D., & Yu, Q. (2014). Fingerprint ridge orientation field reconstruction using the best quadratic approximation by orthogonal polynomials in two discrete variables. Pattern Recognition, 47(10), 3304–3313.
Abushariah, A. A. M., Gunawan, T. S., Khalifa, O. O., & Abushariah, M. A. M. (2010). English digits speech recognition system based on Hidden Markov Models’. In 2010 International Conference on Computer and Communication Engineering (ICCCE) (pp. 1–5).
Majumder, A., & Changder, S. (2013). A novel approach for text steganography: Generating text summary using reflection symmetry. Procedia Technology, 10, 112–120.
Sghaier, G., & Nidal, N. (2012). An audio/video crypto—Adaptive optical steganography technique. In 2012 8th International (IEEE) Wireless Communications and Mobile Computing Conference (IWCMC) (pp. 1057–1062).
Natarajan, M., & Lopamudra, N. (2010). A review of the audio and video steganalysis algorithms. In Proceedings of the 48th Annual Southeast Regional Conference (ACM) (p. 81).
Sumit, B., & Radu, S. (2014). Trusted DB: A trusted hardware-based database with privacy and data confidentiality. IEEE Transactions on Knowledge and Data Engineering, 26(3), 752–765.
Lee, G. (2015). 3D coverage location modeling of Wi-Fi access point placement in indoor environment. Computers, Environment and Urban Systems.
Zhuang, Y., Syed; Z., Georgy, J., & El-Sheimy, N. (2015). Autonomous smartphone-based WiFi positioning system by using access points localization and crowdsourcing. Pervasive and Mobile Computing, 18, 118–136.
Cai-hong, L., Jin-shui, J., & Zi-long, L. (2013). Implementation of DES encryption arithmetic based on FPGA. AASRI Procedia, 5, 209–213.
Ahmed, A. M., & Khairulmizam, S. (2011). A framework for GPU-accelerated AES-XTS encryption in mobile devices. In IEEE Region 10 Conference (IEEE) TENCON 2011–2011 (pp. 144–148).
Wang, X., David, H. M., & Mark, L. S. (2013). Stop-and-wait automatic repeat request schemes for molecular communications. In 2013 First International Black Sea Conference on (IEEE) Communications and Networking (BlackSeaCom) (pp. 84–88).
Reviriego, P., Flanagan, F. M., Liu, S.-F., & Maestro, J. A. (2012). Error-detection enhanced decoding of difference set codes for memory applications. IEEE Transactions on Device and Materials Reliability, 12(2), 335–340.
Paulo, P. E., Fábio, P., & Jaymel, S. L. (2012). Exact and approximation algorithms for error- detecting even codes. Theoretical Computer Science, 440, 60–72.
Ted, H., Li, Y., Park, S.-B., Mui, D., & Lin, D. (2010). QED: Quick error detection tests for effective post-silicon validation. In 2010 IEEE International (IEEE) Test Conference (ITC) (pp. 1–10).
Puangpronpitag, S., Kasabai, P., & Pansa, D. (2012). An enhancement of the SDP security description (SDES) for key protection. In 2012 9th International Conference on Computer, Telecommunications and Information Technology (pp. 1–4). IEEE.
Bhattacharjee, S., Rahim, L. B. A., Zakaria, M. N., & Aziz, I. B. A. (2018). A protocol for selecting the strongest and authentic hotspot for transferring big data in wireless infrastructure. In 2018 International Conference on Computer and Information Sciences. IEEE.
Bhattacharjee, S., Rahim, L. B. A., & Aziz, I. B. A. (2014). A multibit burst error detection and correction mechanism for application layer. International Conference onComputer and Information Sciences (ICCOINS). IEEE.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bhattacharjee, S., Midhun Chakkaravarthy, D., Midhun Chakkaravarthy, Rahim, L.B.A. (2020). An Integrated Technique to Ensure Confidentiality and Integrity in Data Transmission Through the Strongest and Authentic Hotspot Selection Mechanism. In: Sharma, N., Chakrabarti, A., Balas, V. (eds) Data Management, Analytics and Innovation. Advances in Intelligent Systems and Computing, vol 1016. Springer, Singapore. https://doi.org/10.1007/978-981-13-9364-8_33
Download citation
DOI: https://doi.org/10.1007/978-981-13-9364-8_33
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9363-1
Online ISBN: 978-981-13-9364-8
eBook Packages: EngineeringEngineering (R0)