Javascript must be enabled to continue!
Enhanced Security using Multiple paths routine scheme in Cloud-MANETs
View through CrossRef
AbstractCloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-organized mobile gadgets that can communicate with each other with no support from a central authority or infrastructure. The main advantage of MANETs is its ability to manage mobility while data communication between different users in the system occurs. In MANETs, clustering is an active technique used to manage mobile nodes. The security of MANETs is a key aspect for the fundamental functionality of the network. Addressing the security-related problems ensures that the confidentiality and integrity of the data transmission is secure. MANETs are highly prone to attacks because of their properties. In clustering schemes, the network is broken down to sub-networks called clusters. These clusters can have overlapping nodes or be disjointed. An enhanced node referred to as the Cluster Head (CH) is chosen from each set to oversee tasks related to routing. It decreases the member nodes’ overhead and improves the performance of the system. The relationship between the nodes and CH may vary randomly, leading to re-associations and re-clustering in a MANET that is clustered. An efficient and effective routing protocol is required to allow networking and to find the most suitable paths between the nodes. The networking must be spontaneous, infrastructure-less, and provide end-to-end interactions. The aim of routing is the provision of maximum network load distribution and robust networks. This study focused on the creation of a maximal route between a pair of nodes, and to ensure the appropriate and accurate delivery of the packet. The proposed solution ensured that routing can be carried out with the lowest bandwidth consumption, least packet loss, and control overhead, thereby enhancing the output of the network. Our result shows that multipath routing enables the network to identify alternate paths connecting the destination and source. Routing is required to conserve energy and for optimum bandwidth utilization.
Springer Science and Business Media LLC
Title: Enhanced Security using Multiple paths routine scheme in Cloud-MANETs
Description:
AbstractCloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices.
MANETs is a pool of self-organized mobile gadgets that can communicate with each other with no support from a central authority or infrastructure.
The main advantage of MANETs is its ability to manage mobility while data communication between different users in the system occurs.
In MANETs, clustering is an active technique used to manage mobile nodes.
The security of MANETs is a key aspect for the fundamental functionality of the network.
Addressing the security-related problems ensures that the confidentiality and integrity of the data transmission is secure.
MANETs are highly prone to attacks because of their properties.
In clustering schemes, the network is broken down to sub-networks called clusters.
These clusters can have overlapping nodes or be disjointed.
An enhanced node referred to as the Cluster Head (CH) is chosen from each set to oversee tasks related to routing.
It decreases the member nodes’ overhead and improves the performance of the system.
The relationship between the nodes and CH may vary randomly, leading to re-associations and re-clustering in a MANET that is clustered.
An efficient and effective routing protocol is required to allow networking and to find the most suitable paths between the nodes.
The networking must be spontaneous, infrastructure-less, and provide end-to-end interactions.
The aim of routing is the provision of maximum network load distribution and robust networks.
This study focused on the creation of a maximal route between a pair of nodes, and to ensure the appropriate and accurate delivery of the packet.
The proposed solution ensured that routing can be carried out with the lowest bandwidth consumption, least packet loss, and control overhead, thereby enhancing the output of the network.
Our result shows that multipath routing enables the network to identify alternate paths connecting the destination and source.
Routing is required to conserve energy and for optimum bandwidth utilization.
Related Results
Developing a Cloud Computing Framework for University Libraries
Developing a Cloud Computing Framework for University Libraries
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...
Hybrid Cloud Scheduling Method for Cloud Bursting
Hybrid Cloud Scheduling Method for Cloud Bursting
In the paper, we consider the hybrid cloud model used for cloud bursting, when the computational capacity of the private cloud provider is insufficient to deal with the peak number...
Assessing Security with Regard to Cloud Applications in STEM Education
Assessing Security with Regard to Cloud Applications in STEM Education
There are many steps involved with securing a cloud system and its applications (SaaS) and developed ones in (PaaS). Security and privacy issues represent the biggest concerns to m...
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
Decoding the Cloud Giants: A Comparison of AWS, Azure and GCP
Decoding the Cloud Giants: A Comparison of AWS, Azure and GCP
The adoption of cloud services by companies and organizations is increasingly becoming essential for enhancing competitive performance in today's business environment. Cloud servic...
Security and Privacy Issues in Cloud Computing
Security and Privacy Issues in Cloud Computing
<p>With a variety of software and hardware services available to users, cloud computing has developed in recent years as a very influential and transformational technology. I...

