An Integrated Technique to Ensure Confidentiality and Integrity in Data Transmission Through the Strongest and Authentic Hotspot Selection Mechanism

  • Shiladitya Bhattacharjee
  • Divya Midhun ChakkaravarthyEmail author
  • Midhun Chakkaravarthy
  • Lukman Bin Ab. Rahim
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1016)


Wireless technology has consistently been a popular resolution for handling the growing demand of data receiving in mobile linkages as the availability of high-speed internet is increasing rapidly. Although, the legacy of such technology shortages of seamless inter-communication amid the wireless link as well as mobile cellular linkages on one individual pointer as well as among the wireless hotspots conversely. Subsequently, data confidentiality and integrity are also primary concerns in data transmission through any network. There can be various weak and strong hotspots, since it is also possible to have fake hotspot in any network. A number of researches have been conducted to ensure data security by selecting the strong and authentic hotspot in wireless network infrastructure. However, the present literature fails to offer any security mechanism that can select the strongest, authentic hotspot and secure data confidentiality as well as integrity at the same time. Hence, this research aims to build an integrated technique that can offer adequate level of data confidentiality and integrity along with the selection of a strongest and most authentic hotspot. The proposed integrated technique comprises a unique hotspot selection and a SDES-based authentication mechanism to establish a secure communication link by picking the strongest hotspot. It encrypts the input data with SDES to assure confidentiality and uses an idle error checking technique with a backup scheme for fortuitous information loss to protect data integrity during transmission. The experimental results show its superiority over other existing techniques by improving QoE demands and fairness matrices. It offers higher avalanche effect and entropy values which justify its capacity to offer adequate data confidentiality. The capacity to offer lower percentage of information loss proves its efficiency in offering data integrity.


Avalanche effect and entropy values Backup system for accidental data loss Data confidentiality and integrity Strongest and authentic hotspot SDES-based authentication SNR and percentage of information loss QoE demands and fairness matrices 


  1. 1.
    Louta, M., Zournatzis, P., Kraounakis, S., Sarigiannidis, P., & Demetropoulos, I. (2011). Towards realization of the ABC vision: A comparative survey of access network selection. In 2011 IEEE Symposium on Computers and Communications (ISCC) (pp. 472–477), June 28–July 1, 2011.Google Scholar
  2. 2.
    Zhihong, L., Yaping, L., Zhenghu, G., & Lin, C. (2011). A Muti-rate access point selection policy in IEEE 802.11 WLANs. In 2011 International Conference on Multimedia Technology (ICMT) (pp. 63–67), July 26–28, 2011.Google Scholar
  3. 3.
    Bennai, M., Sydor, J., & Rahman, M. (2010). Automatic channel selection for cognitive radio systems. In 2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC) (pp. 1831–1835), September 26–30, 2010.Google Scholar
  4. 4.
    Tuysuz, M. F., & Mantar, H. A. (2010). Access point selection and reducing the handoff latency to support VoIP traffic. In 2010 International Conference on Computer Engineering and Systems (ICCES) (pp. 58–63), November 30–December 2, 2010.Google Scholar
  5. 5.
    Gharsellaoui, A., Chahine, M. K., & Mazzini, G. (2011). Optimizing access point selection in wireless local area networks. In 2011 International Conference on Communications and Information Technology (ICCIT) (pp. 47–52), March 29–31, 2011.Google Scholar
  6. 6.
    Mingyi, H., Garcia, A., & Barrera, J. (2011). Joint distributed access point selection and power allocation in cognitive radio networks. In INFOCOM, 2011 Proceedings (pp. 2516–2524). IEEE, April 10–15, 2011.Google Scholar
  7. 7.
    Balachandran, K., Kang, J. H., Karakayali, K., & Rege, K. (2011). Cell selection with downlink resource partitioning in heterogeneous networks. In 2011 IEEE International Conference on Communications Workshops (ICC) (pp. 1–6), June 5–9, 2011.Google Scholar
  8. 8.
    Haoxuan, M., Zhanbin, W., Jingcheng, W., Langwen, Z., & Liu, Z. (2014). A novel access point selection strategy for indoor location with Wi-Fi. In The 26th Chinese Control and Decision Conference (2014 CCDC) (pp. 5260–5265), May 31–June 2, 2014.Google Scholar
  9. 9.
    Yaqing, Z., & Sampalli, S. (2010). Client-based intrusion prevention system for 802.11 wireless LANs. In 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (pp. 100–107), October 11–13, 2010.Google Scholar
  10. 10.
    Choi, J., Chang, S.-Y., Diko, K., & Hu, Y.-C. (2011). Secure MAC-layer protocol for captive portals in wireless hotspots. In 2011 IEEE International Conference on Communications (ICC) (pp. 1–5), June 5–9, 2011.Google Scholar
  11. 11.
    Chew, C. C., Funabiki, N., & Fujita, S. (2014). Extensions of active access-point selection algorithm for wireless mesh networks using IEEE802.11ac Protocol. In 2014 Second International Symposium on Computing and Networking (CANDAR) (pp. 310–314), December 10–12, 2014.Google Scholar
  12. 12.
    Ruikai, M., Nguyen, D. H. N., & Tho, L.-N. (2015). Joint access point selection and linear precoding game for MIMO multiple-access channels. In Wireless Communications and Networking Conference (WCNC) (pp. 753–758). IEEE, March 9–12, 2015.Google Scholar
  13. 13.
    Chauhan, N., & Yadav, R. K. (2012). Security analysis of identity based cryptography and certificate based in wimax network using Omnet++ simulator. In 2012 Second International Conference onAdvanced Computing & Communication Technologies (ACCT) (pp. 509–512), January 7–8, 2012.Google Scholar
  14. 14.
    Soon, K. H., Kim, E., & Hwangnam, K. (2012). QoE-driven Wi-Fi selection mechanism for next generation smartphones. In 2012 First IEEE Workshop on Enabling Technologies for Smartphone and Internet of Things (ETSIoT) (pp. 13–18), June 18, 2012.Google Scholar
  15. 15.
    Corena, J. C., & Ohtsuki, T. (2012). A Multiple-MAC-based protocol to identify misbehaving nodes in network coding. In Vehicular Technology Conference (VTC Fall) (pp. 1–5), September 3–6, 2012.Google Scholar
  16. 16.
    Yi, X., Chen, N., Jia, Z., & Chen, X. (2010). Trusted communication system based on RSA authentication. In 2010 Second International Workshop on Education Technology and Computer Science (IEEE) (pp. 329–332).Google Scholar
  17. 17.
    Weixin, B., Luo, Y., Xu, D., & Yu, Q. (2014). Fingerprint ridge orientation field reconstruction using the best quadratic approximation by orthogonal polynomials in two discrete variables. Pattern Recognition, 47(10), 3304–3313.CrossRefGoogle Scholar
  18. 18.
    Abushariah, A. A. M., Gunawan, T. S., Khalifa, O. O., & Abushariah, M. A. M. (2010). English digits speech recognition system based on Hidden Markov Models’. In 2010 International Conference on Computer and Communication Engineering (ICCCE) (pp. 1–5).Google Scholar
  19. 19.
    Majumder, A., & Changder, S. (2013). A novel approach for text steganography: Generating text summary using reflection symmetry. Procedia Technology, 10, 112–120.Google Scholar
  20. 20.
    Sghaier, G., & Nidal, N. (2012). An audio/video crypto—Adaptive optical steganography technique. In 2012 8th International (IEEE) Wireless Communications and Mobile Computing Conference (IWCMC) (pp. 1057–1062).Google Scholar
  21. 21.
    Natarajan, M., & Lopamudra, N. (2010). A review of the audio and video steganalysis algorithms. In Proceedings of the 48th Annual Southeast Regional Conference (ACM) (p. 81).Google Scholar
  22. 22.
    Sumit, B., & Radu, S. (2014). Trusted DB: A trusted hardware-based database with privacy and data confidentiality. IEEE Transactions on Knowledge and Data Engineering, 26(3), 752–765.CrossRefGoogle Scholar
  23. 23.
    Lee, G. (2015). 3D coverage location modeling of Wi-Fi access point placement in indoor environment. Computers, Environment and Urban Systems.CrossRefGoogle Scholar
  24. 24.
    Zhuang, Y., Syed; Z., Georgy, J., & El-Sheimy, N. (2015). Autonomous smartphone-based WiFi positioning system by using access points localization and crowdsourcing. Pervasive and Mobile Computing, 18, 118–136.Google Scholar
  25. 25.
    Cai-hong, L., Jin-shui, J., & Zi-long, L. (2013). Implementation of DES encryption arithmetic based on FPGA. AASRI Procedia, 5, 209–213.CrossRefGoogle Scholar
  26. 26.
    Ahmed, A. M., & Khairulmizam, S. (2011). A framework for GPU-accelerated AES-XTS encryption in mobile devices. In IEEE Region 10 Conference (IEEE) TENCON 2011–2011 (pp. 144–148).Google Scholar
  27. 27.
    Wang, X., David, H. M., & Mark, L. S. (2013). Stop-and-wait automatic repeat request schemes for molecular communications. In 2013 First International Black Sea Conference on (IEEE) Communications and Networking (BlackSeaCom) (pp. 84–88).Google Scholar
  28. 28.
    Reviriego, P., Flanagan, F. M., Liu, S.-F., & Maestro, J. A. (2012). Error-detection enhanced decoding of difference set codes for memory applications. IEEE Transactions on Device and Materials Reliability, 12(2), 335–340.CrossRefGoogle Scholar
  29. 29.
    Paulo, P. E., Fábio, P., & Jaymel, S. L. (2012). Exact and approximation algorithms for error- detecting even codes. Theoretical Computer Science, 440, 60–72.MathSciNetzbMATHGoogle Scholar
  30. 30.
    Ted, H., Li, Y., Park, S.-B., Mui, D., & Lin, D. (2010). QED: Quick error detection tests for effective post-silicon validation. In 2010 IEEE International (IEEE) Test Conference (ITC) (pp. 1–10).Google Scholar
  31. 31.
    Puangpronpitag, S., Kasabai, P., & Pansa, D. (2012). An enhancement of the SDP security description (SDES) for key protection. In 2012 9th International Conference on Computer, Telecommunications and Information Technology (pp. 1–4). IEEE.Google Scholar
  32. 32.
    Bhattacharjee, S., Rahim, L. B. A., Zakaria, M. N., & Aziz, I. B. A. (2018). A protocol for selecting the strongest and authentic hotspot for transferring big data in wireless infrastructure. In 2018 International Conference on Computer and Information Sciences. IEEE.Google Scholar
  33. 33.
    Bhattacharjee, S., Rahim, L. B. A., & Aziz, I. B. A. (2014). A multibit burst error detection and correction mechanism for application layer. International Conference onComputer and Information Sciences (ICCOINS). IEEE.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Shiladitya Bhattacharjee
    • 1
  • Divya Midhun Chakkaravarthy
    • 2
    Email author
  • Midhun Chakkaravarthy
    • 2
  • Lukman Bin Ab. Rahim
    • 1
  1. 1.High Performance Cloud Computing Center (HPC3)Universiti Teknologi PETRONASSeri IskandarMalaysia
  2. 2.Faculty of Computer Science and MultimediaWisma LincolnPetaling JayaMalaysia

Personalised recommendations