Javascript must be enabled to continue!
Parallel Load Balancing and Over-lay Authentication System for Secure Industrial Network Communications
View through CrossRef
On one hand, being a highly self-establishing wireless network with dynamic
topology, mobile adhocnetworks (MANET) are not constrained by limitations of fixed
framework, and as a consequence,MANETs are now used increasingly in a wide range of
fields. On the other hand, flexibility, the typicalnature of MANET, making all nodes in
an uncontrolled environment. Every node despite itssituation is equal to have an
opportunity to deal with route events causing an unstable performanceof the whole MANET
system. To deal such an uncertain problem within any MANET system, thispaper presents a
novel model called Parallel Load Balancing and Overlay authentication System forSecure
Ad-hoc Communications. The model is designed to build up an over-layer to MANET
systemwith those nodes in good condition, which is called strong peers in this paper and
do the routejob to avoid some bad situation like route fail or authentication fail.
Simulation results comparingMANET system with and without the help of over-layer are
provided to demonstrate the proposedmodel suitability for secure ad-hoc
communications.
Title: Parallel Load Balancing and Over-lay Authentication System for Secure Industrial
Network Communications
Description:
On one hand, being a highly self-establishing wireless network with dynamic
topology, mobile adhocnetworks (MANET) are not constrained by limitations of fixed
framework, and as a consequence,MANETs are now used increasingly in a wide range of
fields.
On the other hand, flexibility, the typicalnature of MANET, making all nodes in
an uncontrolled environment.
Every node despite itssituation is equal to have an
opportunity to deal with route events causing an unstable performanceof the whole MANET
system.
To deal such an uncertain problem within any MANET system, thispaper presents a
novel model called Parallel Load Balancing and Overlay authentication System forSecure
Ad-hoc Communications.
The model is designed to build up an over-layer to MANET
systemwith those nodes in good condition, which is called strong peers in this paper and
do the routejob to avoid some bad situation like route fail or authentication fail.
Simulation results comparingMANET system with and without the help of over-layer are
provided to demonstrate the proposedmodel suitability for secure ad-hoc
communications.
Related Results
Study on the characteristics and synergistic effects of industrial complex networks – empirical evidence from Chinese manufacturing
Study on the characteristics and synergistic effects of industrial complex networks – empirical evidence from Chinese manufacturing
PurposeThe manufacturing industry and the producer service industry have a high degree of industrial correlation, and their integration will cause changes in the complex industrial...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
The security of Quantum Secure Direct Communication (QSDC) and its authentication procedure based on multiple stages is analyzed. The security analysis shows that the process of au...
Implementasi Metode Load Balancing Sebagai Upaya Meningkatkan Kinerja Server
Implementasi Metode Load Balancing Sebagai Upaya Meningkatkan Kinerja Server
The use of the internet turns out to cause problems that must be found a solution. One of them is the service provider's server load which continues to increase. This condition is ...
Crane Load Moment System For Offshore Crane Operations
Crane Load Moment System For Offshore Crane Operations
Abstract
History has shown that dependency upon the crane operator to monitor loads and boom angle or load radius do not allow the margin necessary to perform the...
E-Authentication System using QR Code and OTP
E-Authentication System using QR Code and OTP
This paper proposes an authentication system that combines One-Time Password (OTP) and Quick Response (QR) code technologies to enhance security and user experience. The system gen...

