Skip to main content

An Integrated Technique to Ensure Confidentiality and Integrity in Data Transmission Through the Strongest and Authentic Hotspot Selection Mechanism

  • Conference paper
  • First Online:
Book cover Data Management, Analytics and Innovation

Abstract

Wireless technology has consistently been a popular resolution for handling the growing demand of data receiving in mobile linkages as the availability of high-speed internet is increasing rapidly. Although, the legacy of such technology shortages of seamless inter-communication amid the wireless link as well as mobile cellular linkages on one individual pointer as well as among the wireless hotspots conversely. Subsequently, data confidentiality and integrity are also primary concerns in data transmission through any network. There can be various weak and strong hotspots, since it is also possible to have fake hotspot in any network. A number of researches have been conducted to ensure data security by selecting the strong and authentic hotspot in wireless network infrastructure. However, the present literature fails to offer any security mechanism that can select the strongest, authentic hotspot and secure data confidentiality as well as integrity at the same time. Hence, this research aims to build an integrated technique that can offer adequate level of data confidentiality and integrity along with the selection of a strongest and most authentic hotspot. The proposed integrated technique comprises a unique hotspot selection and a SDES-based authentication mechanism to establish a secure communication link by picking the strongest hotspot. It encrypts the input data with SDES to assure confidentiality and uses an idle error checking technique with a backup scheme for fortuitous information loss to protect data integrity during transmission. The experimental results show its superiority over other existing techniques by improving QoE demands and fairness matrices. It offers higher avalanche effect and entropy values which justify its capacity to offer adequate data confidentiality. The capacity to offer lower percentage of information loss proves its efficiency in offering data integrity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Louta, M., Zournatzis, P., Kraounakis, S., Sarigiannidis, P., & Demetropoulos, I. (2011). Towards realization of the ABC vision: A comparative survey of access network selection. In 2011 IEEE Symposium on Computers and Communications (ISCC) (pp. 472–477), June 28–July 1, 2011.

    Google Scholar 

  2. Zhihong, L., Yaping, L., Zhenghu, G., & Lin, C. (2011). A Muti-rate access point selection policy in IEEE 802.11 WLANs. In 2011 International Conference on Multimedia Technology (ICMT) (pp. 63–67), July 26–28, 2011.

    Google Scholar 

  3. Bennai, M., Sydor, J., & Rahman, M. (2010). Automatic channel selection for cognitive radio systems. In 2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC) (pp. 1831–1835), September 26–30, 2010.

    Google Scholar 

  4. Tuysuz, M. F., & Mantar, H. A. (2010). Access point selection and reducing the handoff latency to support VoIP traffic. In 2010 International Conference on Computer Engineering and Systems (ICCES) (pp. 58–63), November 30–December 2, 2010.

    Google Scholar 

  5. Gharsellaoui, A., Chahine, M. K., & Mazzini, G. (2011). Optimizing access point selection in wireless local area networks. In 2011 International Conference on Communications and Information Technology (ICCIT) (pp. 47–52), March 29–31, 2011.

    Google Scholar 

  6. Mingyi, H., Garcia, A., & Barrera, J. (2011). Joint distributed access point selection and power allocation in cognitive radio networks. In INFOCOM, 2011 Proceedings (pp. 2516–2524). IEEE, April 10–15, 2011.

    Google Scholar 

  7. Balachandran, K., Kang, J. H., Karakayali, K., & Rege, K. (2011). Cell selection with downlink resource partitioning in heterogeneous networks. In 2011 IEEE International Conference on Communications Workshops (ICC) (pp. 1–6), June 5–9, 2011.

    Google Scholar 

  8. Haoxuan, M., Zhanbin, W., Jingcheng, W., Langwen, Z., & Liu, Z. (2014). A novel access point selection strategy for indoor location with Wi-Fi. In The 26th Chinese Control and Decision Conference (2014 CCDC) (pp. 5260–5265), May 31–June 2, 2014.

    Google Scholar 

  9. Yaqing, Z., & Sampalli, S. (2010). Client-based intrusion prevention system for 802.11 wireless LANs. In 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (pp. 100–107), October 11–13, 2010.

    Google Scholar 

  10. Choi, J., Chang, S.-Y., Diko, K., & Hu, Y.-C. (2011). Secure MAC-layer protocol for captive portals in wireless hotspots. In 2011 IEEE International Conference on Communications (ICC) (pp. 1–5), June 5–9, 2011.

    Google Scholar 

  11. Chew, C. C., Funabiki, N., & Fujita, S. (2014). Extensions of active access-point selection algorithm for wireless mesh networks using IEEE802.11ac Protocol. In 2014 Second International Symposium on Computing and Networking (CANDAR) (pp. 310–314), December 10–12, 2014.

    Google Scholar 

  12. Ruikai, M., Nguyen, D. H. N., & Tho, L.-N. (2015). Joint access point selection and linear precoding game for MIMO multiple-access channels. In Wireless Communications and Networking Conference (WCNC) (pp. 753–758). IEEE, March 9–12, 2015.

    Google Scholar 

  13. Chauhan, N., & Yadav, R. K. (2012). Security analysis of identity based cryptography and certificate based in wimax network using Omnet++ simulator. In 2012 Second International Conference onAdvanced Computing & Communication Technologies (ACCT) (pp. 509–512), January 7–8, 2012.

    Google Scholar 

  14. Soon, K. H., Kim, E., & Hwangnam, K. (2012). QoE-driven Wi-Fi selection mechanism for next generation smartphones. In 2012 First IEEE Workshop on Enabling Technologies for Smartphone and Internet of Things (ETSIoT) (pp. 13–18), June 18, 2012.

    Google Scholar 

  15. Corena, J. C., & Ohtsuki, T. (2012). A Multiple-MAC-based protocol to identify misbehaving nodes in network coding. In Vehicular Technology Conference (VTC Fall) (pp. 1–5), September 3–6, 2012.

    Google Scholar 

  16. Yi, X., Chen, N., Jia, Z., & Chen, X. (2010). Trusted communication system based on RSA authentication. In 2010 Second International Workshop on Education Technology and Computer Science (IEEE) (pp. 329–332).

    Google Scholar 

  17. Weixin, B., Luo, Y., Xu, D., & Yu, Q. (2014). Fingerprint ridge orientation field reconstruction using the best quadratic approximation by orthogonal polynomials in two discrete variables. Pattern Recognition, 47(10), 3304–3313.

    Article  Google Scholar 

  18. Abushariah, A. A. M., Gunawan, T. S., Khalifa, O. O., & Abushariah, M. A. M. (2010). English digits speech recognition system based on Hidden Markov Models’. In 2010 International Conference on Computer and Communication Engineering (ICCCE) (pp. 1–5).

    Google Scholar 

  19. Majumder, A., & Changder, S. (2013). A novel approach for text steganography: Generating text summary using reflection symmetry. Procedia Technology, 10, 112–120.

    Google Scholar 

  20. Sghaier, G., & Nidal, N. (2012). An audio/video crypto—Adaptive optical steganography technique. In 2012 8th International (IEEE) Wireless Communications and Mobile Computing Conference (IWCMC) (pp. 1057–1062).

    Google Scholar 

  21. Natarajan, M., & Lopamudra, N. (2010). A review of the audio and video steganalysis algorithms. In Proceedings of the 48th Annual Southeast Regional Conference (ACM) (p. 81).

    Google Scholar 

  22. Sumit, B., & Radu, S. (2014). Trusted DB: A trusted hardware-based database with privacy and data confidentiality. IEEE Transactions on Knowledge and Data Engineering, 26(3), 752–765.

    Article  Google Scholar 

  23. Lee, G. (2015). 3D coverage location modeling of Wi-Fi access point placement in indoor environment. Computers, Environment and Urban Systems.

    Article  Google Scholar 

  24. Zhuang, Y., Syed; Z., Georgy, J., & El-Sheimy, N. (2015). Autonomous smartphone-based WiFi positioning system by using access points localization and crowdsourcing. Pervasive and Mobile Computing, 18, 118–136.

    Google Scholar 

  25. Cai-hong, L., Jin-shui, J., & Zi-long, L. (2013). Implementation of DES encryption arithmetic based on FPGA. AASRI Procedia, 5, 209–213.

    Article  Google Scholar 

  26. Ahmed, A. M., & Khairulmizam, S. (2011). A framework for GPU-accelerated AES-XTS encryption in mobile devices. In IEEE Region 10 Conference (IEEE) TENCON 2011–2011 (pp. 144–148).

    Google Scholar 

  27. Wang, X., David, H. M., & Mark, L. S. (2013). Stop-and-wait automatic repeat request schemes for molecular communications. In 2013 First International Black Sea Conference on (IEEE) Communications and Networking (BlackSeaCom) (pp. 84–88).

    Google Scholar 

  28. Reviriego, P., Flanagan, F. M., Liu, S.-F., & Maestro, J. A. (2012). Error-detection enhanced decoding of difference set codes for memory applications. IEEE Transactions on Device and Materials Reliability, 12(2), 335–340.

    Article  Google Scholar 

  29. Paulo, P. E., Fábio, P., & Jaymel, S. L. (2012). Exact and approximation algorithms for error- detecting even codes. Theoretical Computer Science, 440, 60–72.

    MathSciNet  MATH  Google Scholar 

  30. Ted, H., Li, Y., Park, S.-B., Mui, D., & Lin, D. (2010). QED: Quick error detection tests for effective post-silicon validation. In 2010 IEEE International (IEEE) Test Conference (ITC) (pp. 1–10).

    Google Scholar 

  31. Puangpronpitag, S., Kasabai, P., & Pansa, D. (2012). An enhancement of the SDP security description (SDES) for key protection. In 2012 9th International Conference on Computer, Telecommunications and Information Technology (pp. 1–4). IEEE.

    Google Scholar 

  32. Bhattacharjee, S., Rahim, L. B. A., Zakaria, M. N., & Aziz, I. B. A. (2018). A protocol for selecting the strongest and authentic hotspot for transferring big data in wireless infrastructure. In 2018 International Conference on Computer and Information Sciences. IEEE.

    Google Scholar 

  33. Bhattacharjee, S., Rahim, L. B. A., & Aziz, I. B. A. (2014). A multibit burst error detection and correction mechanism for application layer. International Conference onComputer and Information Sciences (ICCOINS). IEEE.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Divya Midhun Chakkaravarthy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bhattacharjee, S., Midhun Chakkaravarthy, D., Midhun Chakkaravarthy, Rahim, L.B.A. (2020). An Integrated Technique to Ensure Confidentiality and Integrity in Data Transmission Through the Strongest and Authentic Hotspot Selection Mechanism. In: Sharma, N., Chakrabarti, A., Balas, V. (eds) Data Management, Analytics and Innovation. Advances in Intelligent Systems and Computing, vol 1016. Springer, Singapore. https://doi.org/10.1007/978-981-13-9364-8_33

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-9364-8_33

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-9363-1

  • Online ISBN: 978-981-13-9364-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics