Instant download (Ebook) Architectural Wireless Networks Solutions and Security Issues (Lecture Notes in Networks and Systems, 196) by Santosh Kumar Das (editor), Sourav Samanta (editor), Nilanjan Dey (editor), Bharat S. Patel (editor), Aboul Ella Hassanien (editor) ISBN 9789811603853, 9811603855 pdf all chapter
Instant download (Ebook) Architectural Wireless Networks Solutions and Security Issues (Lecture Notes in Networks and Systems, 196) by Santosh Kumar Das (editor), Sourav Samanta (editor), Nilanjan Dey (editor), Bharat S. Patel (editor), Aboul Ella Hassanien (editor) ISBN 9789811603853, 9811603855 pdf all chapter
com
OR CLICK HERE
DOWLOAD EBOOK
ebooknice.com
https://ebooknice.com/product/vagabond-vol-29-29-37511002
ebooknice.com
ebooknice.com
(Ebook) SAT II Success MATH 1C and 2C 2002 (Peterson's SAT
II Success) by Peterson's ISBN 9780768906677, 0768906679
https://ebooknice.com/product/sat-ii-success-
math-1c-and-2c-2002-peterson-s-sat-ii-success-1722018
ebooknice.com
https://ebooknice.com/product/boeing-b-29-superfortress-1573658
ebooknice.com
https://ebooknice.com/product/29-single-and-nigerian-53599780
ebooknice.com
https://ebooknice.com/product/jahrbuch-fur-geschichte-band-29-50958290
ebooknice.com
https://ebooknice.com/product/harrow-county-29-53599548
ebooknice.com
Lecture Notes in Networks and Systems 196
Architectural
Wireless
Networks
Solutions and
Security Issues
Lecture Notes in Networks and Systems
Volume 196
Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
Advisory Editors
Fernando Gomide, Department of Computer Engineering and Automation—DCA,
School of Electrical and Computer Engineering—FEEC, University of Campinas—
UNICAMP, São Paulo, Brazil
Okyay Kaynak, Department of Electrical and Electronic Engineering,
Bogazici University, Istanbul, Turkey
Derong Liu, Department of Electrical and Computer Engineering, University
of Illinois at Chicago, Chicago, USA; Institute of Automation, Chinese Academy
of Sciences, Beijing, China
Witold Pedrycz, Department of Electrical and Computer Engineering,
University of Alberta, Alberta, Canada, Systems Research Institute,
Polish Academy of Sciences, Warsaw, Poland
Marios M. Polycarpou, Department of Electrical and Computer Engineering,
KIOS Research Center for Intelligent Systems and Networks, University of Cyprus,
Nicosia, Cyprus
Imre J. Rudas, Óbuda University, Budapest, Hungary
Jun Wang, Department of Computer Science, City University of Hong Kong,
Kowloon, Hong Kong
The series “Lecture Notes in Networks and Systems” publishes the latest
developments in Networks and Systems—quickly, informally and with high quality.
Original research reported in proceedings and post-proceedings represents the core
of LNNS.
Volumes published in LNNS embrace all aspects and subfields of, as well as new
challenges in, Networks and Systems.
The series contains proceedings and edited volumes in systems and networks,
spanning the areas of Cyber-Physical Systems, Autonomous Systems, Sensor
Networks, Control Systems, Energy Systems, Automotive Systems, Biological
Systems, Vehicular Networking and Connected Vehicles, Aerospace Systems,
Automation, Manufacturing, Smart Grids, Nonlinear Systems, Power Systems,
Robotics, Social Systems, Economic Systems and other. Of particular value to both
the contributors and the readership are the short publication timeframe and the
world-wide distribution and exposure which enable both a wide and rapid
dissemination of research output.
The series covers the theory, applications, and perspectives on the state of the art
and future developments relevant to systems and networks, decision making, control,
complex processes and related areas, as embedded in the fields of interdisciplinary
and applied sciences, engineering, computer science, physics, economics, social, and
life sciences, as well as the paradigms and methodologies behind them.
Indexed by SCOPUS, INSPEC, WTI Frankfurt eG, zbMATH, SCImago.
All books published in the series are submitted for consideration in Web of Science.
Architectural Wireless
Networks Solutions
and Security Issues
Editors
Santosh Kumar Das Sourav Samanta
Department of Computer Science Department of Computer Science
and Engineering and Engineering
Sarala Birla University University Institute of Technology
Birla Knowledge City Burdwan University
Ranchi, Jharkhand, India Burdwan, West Bengal, India
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Singapore Pte Ltd. 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse
of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface
In the last few decades, the application of wireless network increased rapidly along
with its several variations based on diverse applications of the users and customers.
Its main reason is flexibility and efficiency of the wireless network which is not
available in the wired network. So, it brings a large number of jobs, applications, and
opportunities for the students as well as customers. Although, the wireless network
is an efficient and robustness platform for communication and data transmission, it
has also some challenges and security issues in terms of several applications. Some
of them are mentioned as limited hardware resources, unreliable communication, the
dynamic topology of some wireless networks, vulnerability, unsecure environment,
etc. Hence, it causes several types of attacks, data loss, replication, eavesdropping,
overflow, etc., with respect to the architecture design of the wireless network. These
issues cannot be controlled and managed directly, but it can model and reduce as an
architectural solution. Therefore, to enhance the architecture model of the wireless
network and enhance the security mechanism, some innovative as well as novel ideas
are needed that reflected in this book.
This book contains some architectural solutions of wireless network and its
variations. It deals with modeling, analysis, design, and enhancement of different
architectural parts of the wireless network. The main aim of this book is to enhance
the applications of the wireless network by reducing and controlling its
architectural issues. This book is edited for wireless network’s users, academicians,
and researchers.
v
vi Preface
The book contains 17 chapters that are organized in four parts as follows. Before
starting the parts, Chap. “Wireless Networks: Applications, Challenges and Security
Issues” describes the overview of wireless network and its variation along with
its several applications, challenges, and security issues. Part One contains four
chapters that outline the modeling of some security issues with their solutions for
enhancing the security part of the wireless network. Part Two contains four chapters
that highlight some optimization models of the wireless network for enhancing the
network lifetime. Part Three contains four chapters that outline the modeling of
the aggregation system to control redundant information. Part Four contains four
chapters that highlight some troubleshooting techniques that help to control and
manage different issues of the network.
This part outlines some security issues along with their solutions in the wireless
network and its variations as wireless sensor network and cloud-based network.
Short descriptions of these chapters are as follows.
This chapter outlines an authenticate model that handles security and privacy
problems of the cloud-based database. It helps to reduce malicious issues of the
network and provides traceable services to the users. Finally, it helps to find an
appropriate solution for the security issues at both administrator and customer
levels in various directions.
Preface vii
This chapter discusses the dynamic access control model with the fusion of risk aware
and hierarchical attribute set-based encryption. The combination of both methods
provides a scalable and flexible services due to sub-domain hierarchy. It is also
proved to be dynamic by permitting the user to access the data by risk evaluation
using risk engine.
In this chapter, an intelligent protocol is proposed with the fusion of linear secret
sharing and elliptic curve techniques. The combination of both techniques helps to
overcome the drawback of traditional protocols. The proposed security protocol helps
to reduce the overhead of the network and enhance the several security mechanisms
against different conflicting attacks.
viii Preface
This part outlines some optimization models for enhancing the network lifetime of the
wireless network or some variation of the wireless network by reducing uncertainty
information and managing conflicting parameters of the networks. Short descriptions
of these chapters are as follows.
This chapter consists of some machine learning algorithms to optimize the route of
the wireless sensor network. This optimization helps the sensor nodes to learn the
experience data to make appropriate routing decisions and respond to the changing
environment using some learning techniques such as distributed regression, self-
organizing map, and reinforcement learning.
In this chapter, the author proposed a traversal-based diagnosis algorithm that seeks
to diagnose both permanent as well as an intermittent fault in a sensor network. The
proposed algorithm employs a special node called an anchor node to traverse the
field. So, it is decided by a proposed traversal algorithm taking into consideration the
length and breadth of the sensor field and the transmission range of the nodes. The
Preface ix
anchor node stops at defined positions in the deployment field where it executes the
fault diagnosis algorithm taking into consideration the normal sensor nodes which
are in its range.
This part outlines some aggregation techniques that help to model several issues
of the network and reduce redundancy of the wireless network efficiently. Short
descriptions of these chapters are as follows.
In this chapter, the author illustrates how the localization issue in wireless sensor
networks can be solved using the three categorized machine learning algorithms
such as supervised learning, unsupervised learning, and reinforcement learning
algorithms. It also highlights that which machine learning algorithms conjointly
evokes several sensible solutions for localization of nodes that maximize resource
utilization and prolong the lifetime of the network.
x Preface
This chapter highlights the use of big data and IoT for the power systems. IoT can
be used in various areas of power system such as metering, transformer monitoring,
prediction of demand, and planning for future consumption. The main objective of
this chapter is to make a clear understanding of the use of big data and IoT in the
power system and how it will improve customer service and social welfare.
This part outlines different troubles in the wireless network in terms of intrusion,
attack, and chaos and also provide their modeling methods. Short descriptions of
these chapters are as follows.
In this chapter, it is identify and categorize the anomalies in a SCADA system through
data optimization. At the initial stage, the collected real-time SCADA dataset is given
as input. Then by using the aforementioned proposed machine learning algorithms,
these data are clustered and optimized. Later to find the type of intrusion will remain
as a further challenge, and for that, the authors proposed HNA-AA algorithm.
In this chapter, the author analyzed the performance of the mobile ad-hoc network
under grayhole attack as per AODV routing protocol using NS-2 simulation
environment. Several attacks make the network pretty much risky to rely upon
when scaling up on a large scale. Under the mobile ad-hoc network, all the
transmissions between the mobile nodes occur wirelessly.
In this chapter, the proposed chapter employs certain statistical signal processing
techniques to realize the memory, self-similarity, self-organized criticality,
nonlinearity, and chaos in the present time series of worldwide monthly mobile
data traffic per smartphone. This study possibly indicates a persistent, self-similar,
deterministic, nonlinear, and non-chaotic profile with no “soc” for the present time
series.
xiii
Contents
xv
xvi Contents
xvii
xviii Editors and Contributors
Contributors
1 Introduction
In the last few decades, the applications of wireless networks and their variations have
increased rapidly due to the widespread use in the developing wireless techniques
[1–3]. Wireless in its simple form can be expressed as the automation process in
which transfer of data and information takes place without using any wired media.
One might be thinking how can data be transferred without using wires and if so, then
S. K. Das (B)
Department of Computer Science and Engineering, Sarala Birla University, P.O.-Mahilong
Purulia Road, Birla Knowledge City, Ranchi, Jharkhand, India
V. Maheswari
Department of Computer Science, RIT, Roorkee, Uttarakhand 247667, India
A. Sharma
Institute of Nanoengineering and Microsystems, National Tsing Hua University, No. 101, Sec. 2,
Guang Fu Road, Hsinchu 30013, Taiwan R.O.C.
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 1
S. K. Das et al. (eds.), Architectural Wireless Networks Solutions
and Security Issues, Lecture Notes in Networks and Systems 196,
https://doi.org/10.1007/978-981-16-0386-0_1
2 S. K. Das et al.
what is the medium? Air is the only medium for the transfer of data through wireless
mode which in return uses electromagnetic waves for the transmission of signal from
the transmitter to the receiver [4]. One might be able to understand that for short-
ranged communications, one can use the wireless technology very smoothly but
what about the long-range communication? Therein comes the concept of receiving
and transmitting data through the waves, i.e., radio waves, which in it provide some
energy for the transmission to occur over longer distances. Herein, it is cleared out
the use of wireless technology which is applicable and widely used for both short
as well as long-distance communication. Figure 1 shows types of wireless network.
Wireless network are categorized as three major types which are: Wireless ad-hoc
network (WANET) [5, 6], wireless sensor network (WSN) [7, 8], and other wireless
network. WANET is a collection of dynamic nodes that are deployed at a particular
location for any operation. It has several variations or types such as mobile ad-hoc
network (MANET) [9], vehicular ad-hoc network (VANET) [10, 11], and hybrid ad-
hoc network (HANET) [12]. MANET is a collection of mobile nodes that are simply
movable based on the requirement of the users or customers. VANET is a collection
of different vehicles that are connected dynamically to provide the services to the
driver as well as the passenger for an automated system. HANET is a combination of
static as well as dynamic nodes. The combination of both helps the user in both static
and dynamic purpose of the services. WSN is a collection of wireless sensor nodes.
The purpose of these sensor nodes is to sense environmental information and send
it to the base station (BS). BS analyzes this information for future processing and
forwards it to the sink node. WSN is also used in HANET with the fusion of VANET
and smart ad-hoc network to make use the services of Internet of Things (IoT) [13].
In HANET, several physical objects are connected with digital technology to make
an efficient and appropriate communication services in HANET.
IoT is nothing more than a collection of wide range of software, systems, and
users via the Internet technology; having a built-in ability of transferring data over
a network without having a human interaction [14, 15]. Talking about first genera-
tion of IoT, SCADA [16] is an acronym for “supervisory control and data acquisi-
tion”. SCADA provides a bundle full of different types of software-based application
program to perform a particular task which can be accessed from remote location.
It includes both hardware as well as software components. The use of hardware
component is to gather the data and then feed it into the computer, wherein the
next step is carried out by respective software according to the situation. A SCADA
system is used to gather information, like from where the smoke is coming from a
building, then it transfers the information gathered back to the central site, warning
the home station that the smoke has occurred, carrying out the necessary analysis and
further controlling the scenario, gathering some more information for determining
whether the smoke is caused by fire, and displaying the gathered information in a
proper logical and organized manner. Other areas where SCADA system can be used
include municipal water supply, in a small building and many more. The next section
is illustrated with developmental strategy of IoT and other variations of the wireless
network.
The roadmap of the paper as follows. Unit 2 describes some applications of
wireless network and its variations. Unit 3 illustrates some constraints of ad-hoc
and sensor network. Unit 4 describes some security and major design issues. And
Unit 5 concludes the paper.
IoT is one of the novel variations of the wireless network. First of all, an ecosystem of
IoT is developed. This ecosystem is different from the typical ecosystem containing
some planets and stars. This ecosystem contains in it a huge number of hardware
and software devices that are connected to a Web-enabled network source which
encapsulates a number of embedded processors, sensors, hardware, and software
based on the task they are going to be helping with. The gathered data is shared by
the IoT devices by bridging of the data to the gateway of IoT or sending the data
to the cloud based systems where it can be easily analyzed and the output can be
made to be accessed and performed as required. All the objects which are having an
in-built sensor are connected to an IoT based platform, which gathers the data from
various hardware devices and share the unmatched information with the software to
meet the required data analytics.
The ecosystem of IoT platform can itself decide which information is to be taken
into consideration and which can be safely ignored without any loss or manipulation
of data. The information collected is based on a preprogrammed software which
include some patterns and recommendations used to find out some possible prob-
lems or issues before they take place. For an example, a person is the owner of a
supermarket store, and he/she must be aware of the products which are most popular.
Sensors can be placed in the supermarket to detect the most popular areas, and where
customers wait around or stay for a longer span of time [17–19]. The faster selling
products can be identified by checking the daily sales data, in case the most selling
product must not go out with not on stock board; automatically align sales data with
supply, so that popular items don’t go out of stock.
The information gathered by the smart connected devices can guide one in making
smart decisions on the products to have a higher stock, which would be completely
4 S. K. Das et al.
based on the people’s shopping bucket list and would help in saving the man-power
required to take up the stock and check out over people’s activity. It is obvious that the
data gathered by the devices will bring more efficiency and accuracy as compared
to the traditional means; and likewise, more efficiency leads to doing work in a
smarter and more controlled manner and resulting in work. By the help of smart
objects and systems, one can automate certain tasks, particularly when those tasks are
bulky, repetitive, mundane, time-taking, or dangerous. Let us have a look over some
examples to make the scenario clearer and more accurate. In one’s daily monotonous
life routine, everyone has to work for having a meal and having a pending or delayed
work can make one lose one’s job. In this competitive era where technology is faster
than human, many times one faces a scenario where a person woke up on time, but
it’s raining outside or his/her car engine is not working, someone has flattened his/her
car tier, he/she had to get off in traffic and many others. In all such cases, there is a
fixed prepared reason to be used by human for his/her delay. Here comes the role of
IoT where the delay can be easily postponed and one need not have to blame one’s
luck over it. Let us summarize some of the benefits of IoT taking the above scenario
into consideration.
(a) Save time and money
(b) Ease of service
(c) Enhance working experience
(d) Increase productivity
(e) Low investment high returns
(f) Taking smart business decisions
(g) Easy to monitor the business.
IoT helps companies and individuals to take smart decisions, adopt smart technolo-
gies, and allow them to work more productively and efficiently. The major concern
of developer is how they are going to secure the use of such an enormous amount
of data, where all the devices are connected to Internet. For the use of IoT based
devices, the only thing which needs to be taken into consideration is the security and
privacy issues. The IoT based devices needs to be always connected to a network,
the hacker has to simply gain an access to any single device and manipulate all
the data, and for a solution to it, you can provide security patch on a regular time
interval. But how many manufacturers are there who will update it to the latest fire-
wall? Apart from, WANET, MANET, VANET, HANET, and WSN, several wireless
networks are used based on customer requirements such as cellular network, mesh
network, delay tolerant network, and software defined network. The stated varia-
tions of the wireless network have become a major and important part of our life and
real-life applications. The combination of all variations gives a lot of efficient and
reliable benefits to the users and customer in terms of mobility and remote areas. It
is low cost, low time consuming, more efficient, and intelligent compared to wired
network. It is also simple for use and license free and also deployable. Wireless
network is a location-depended service that is a replacement of wired network and
helps to the users and customers in emergency situation, business, offices, traveling
salesman, etc. with combinations of some devices such as Wi-Fi, GPS, and cordless
Wireless Networks: Applications, Challenges, and Security Issues 5
telephones. There are several applications of wireless networks and its variations
which is shown in Fig. 2. Some of them are artificial intelligence, enforcement and
control systems, environmental monitoring, intelligent transport systems, IoT, mili-
tary applications, person locator services, smart environment, telecommunications
system, traffic avoidance, virtual reality visual surveillance sensor networks, etc.
The fusion of WANET and WSN is known as ad-hoc sensor network. Although,
both have some similar features, they also both have some differences like a number
of nodes in WSN are more as compared to WANET. The nodes in WSN, known
as sensor nodes, are more prone to failure and energy drain. Although there are
several applications and usage in terms of wireless network-based infrastructure and
infrastructure-less, static, and dynamic topologies, combination of both have some
limitations that differ from classic network such as limited energy supply, limited
computing power, limited bandwidth of the wireless links connecting data, routing
challenges, data aggregation, coverage and scalability, and data reporting methods
and protocols. Summarized limitations are described as follows.
(a) Limited hardware resources: Due to several issues of WSN such as limited
storage, computational system, limited energy, long distance from receiver, it
is limited by the hardware resources.
6 S. K. Das et al.
Ad-hoc and sensor network and its variations have different capabilities in terms
of topology and network parameters. In the above sections, several limitations and
constraints discussed that motivate for designing an efficient model that care about
the following paradigms.
(a) Modeling of security enhancements: The nodes of ad-hoc and sensor
networks are dynamic and autonomous. They act as routers and help in sending
and transmitting the data packets. It greatly relies on the environment of
the modern technology. It also has several limitations like limited energy
supply, limited computing power, limited bandwidth of the wireless links
connecting data, routing challenges, data aggregation, coverage and scalability,
data reporting methods and protocols, unreliable communication, vulnerability,
and unsecure environment. These stated limitations cause two types of attacks:
passive and active attacks. Examples of passive attacks are message distortion,
unnecessary message reply, leakage or trap secret information, interfering,
and eavesdropping. Examples of active attacks are modify, inject or drop data
packet, modify or read secret data information, packet dropping, packet replica-
tion, routing table poisoning and overflow, etc. So, network needs an intelligent
and efficient security modeling with the help of any artificial intelligence, soft
computing, and machine learning techniques. Sometimes cryptographic tech-
nique is also mixed with any of the stated techniques to make the network more
secure in terms of privacy in both systems like network-based data as well as
cloud-based data.
(b) Optimization Model for Network Lifetime Enhancements: The nature of the
ad-hoc and sensor network is dynamic and autonomous. Each node behaves
as router and acts as an intelligent agent that plays the role of data trans-
ferring agent between source and destination nodes. Due to this intelligence
characteristic, several types of interferences occur. So, there is need of some
optimization techniques to model the network and enhance the lifetime of the
wireless network. Network lifetime is the time duration between when the
network is started and when half of the nodes are exhausted. The optimization
technique is used to find an optimal as well as feasible solutions. The optimal
solution is the best solution among all of the solution, and feasible solution is
the solution nearby optimal solution. In ad-hoc and sensor network, optimal
solution indicates the solution when all network metrics are outperformed in
terms of traditional worst metrics. It helps to increase and decrease the network
metrics based on network lifetime such as packet delivery ration, throughput,
goodput, and residual energy are increases and end-to-end delay, packet loss,
jitter, overhead, are decrease. The combination of both changes helps in overall
network performance.
(c) Modeling of Aggregation Systems: Ad-hoc and sensor network is a collection
of large number of small nodes. The purpose of the wireless sensor nodes is to
sense the main requirement phenomena from the environment and send it to the
8 S. K. Das et al.
required places. The purpose of the network is that it should be useful in several
applications such as military, security maintenance, disaster management, and
habitat monitoring. In each application, a node plays an important role, and
each ad-hoc node or sensor node consists of limited energy capacity or battery
which is not sufficient during any operation. Both the networks have high
density due to several variations of sensor nodes or ad-hoc nodes. Same data
packets are sensed by multiple nodes and raising the redundancy or duplicate
data packets. Data aggregation is used to control this issue efficiently and in an
intelligent way. This data aggregation technique is rapidly used in ad-hoc and
sensor network and their several variations. It helps to enhance the network
lifetime as well as network metrics efficiently.
(d) Analysis of Troubleshooting Techniques: The above-mentioned sections and
paragraphs contain several applications and uses of ad-hoc and sensor network.
In each application, there are several types of randomness and uncertainties. It
raises multiple interferences between one node and another node, source node
to destination node or among multiple neighbor nodes. These interferences and
uncertainties are the main cause of imprecise information and network troubles.
These results in of several network security issues and cause different attacks
that are mentioned in the above section. Hence, there is a need of some intelli-
gent technique using artificial intelligence, soft computing, machine learning,
or any other intelligent technique. Sometimes a single technique is efficient for
handling any trouble. Sometimes there is need of some fusion between multiple
techniques. The combination of multiple techniques provides more robustness
for handling uncertainty of the network and estimate imprecise information
efficiently.
The stated inherent paradigms required some necessary precautions shown in
Fig. 4 which help to overcome some major design issues such as coverage that
indicates communications between two or multiple nodes in term of data acquisition.
Coverage has multiple types like target based and areas based. Target-based
coverage indicates based on destination node cover or sink node cover, and area-based
coverage indicates cover communication range with source node, sink or destination
node, BS, and multiple neighbor nodes. Network lifetime is the key point of the
life cycle of any wireless network or ad-hoc and sensor network. It also indicates
the duration when half of the nodes have exhausted their energy. Network traffic
and network connectivity are two basic points of enhancement of the network life-
time. Sometimes connectivity is slow, sometimes it is fast or moderate, it deals with
the fuzzy value that handles multiple logic between actually true or actually false
values. Network traffic indicates gathering of nodes for communication or data trans-
ferring services. Although, network traffic and network connectivity both are basic
key points of the network lifetime, combination of both has some minor metrics that
also affect the variation of network lifetime. These metrics named as packet delivery
ration, packet loss, average end-to-end delay, throughput, goodput, jitter, etc. These
metrics are affected by control data packets, ratio between data sent and received,
and different inherent elements required during data transfer. The nature of some of
the metrics is same or opposite based on the network behavior.
5 Conclusions
The proposed paper analyzed the details of wireless network and its variations with
their applications, security challenges, and issues. The paper briefly describes the
working principles of wireless network along with its variations such as WANET,
MANET, VANET, WSN, and IoT and how these variations help the user and customer
in context with their real-life applications and requirements. The limitations along
with the constraints give guidelines to the readers and researchers for enhancing the
field of wireless network and their inherent elements. It also guides modeling and
optimization models for security enhancement, network lifetime enhancement, data
aggregation, and troubleshooting techniques.
References
1. Lin Z, Wang P (2019) A review of data sets of short-range wireless networks. Comput Commun
147:138–158
2. Wang W (2020) Deployment and optimization of wireless network node deployment and
optimization in smart cities. Comput Commun 155:117–124
3. Chen Q (2020) Wireless network signal monitoring based on LAN packet capture and protocol
analysis on grid programming. Comput Commun,15:45–52
4. Chen X, Gao L, Chen J, Lu S, Zhou H, Wang T, Wang A, Zhang Z, Guo S, Mu X, Wang, ZL
(2020). A chaotic pendulum triboelectric-electromagnetic hybridized nanogenerator for wave
energy scavenging and self-powered wireless sensing system. Nano Energy 69:104440
5. Vasudeva A, Sood M (2018) Survey on sybil attack defense mechanisms in wireless ad hoc
networks. J Netw Comput Appl 120:78–118
10 S. K. Das et al.
Abstract The cloud computing standards are gaining an increased research interest
due to various benefits they offer. Though there are so many influences with cloud
computing, security and privacy problems are various issues handling with the exten-
sive adaption by the model. Malicious problem of service provider is one more
issue which cannot be traceable by data proprietors. Hence, finding the appropriate
solutions to these security issues at both administrator level and customer level
is very attractive in various directions. Cryptographically enforced access control
for securing electronic pathological records (CEASE) is formulated by extending
the proposed ciphertext-based attribute-based encryption (CP-ABE) with advanced
encryption standard (AES) through limited-shuffle techniques. The main objective of
CEASE is to provide data confidentiality, and access control limited-shuffle protects
the data from inference attacks and protects the data confidentiality for hot data. In the
next step, this research works design a multistage encrypt-or model by differentiating
the users as public and personal. Two separate algorithms such as Vigenere encryp-
tion algorithm and two-fish encryption are applied in personal and public domain,
respectively. Further, where, hierarchical agglomerative clustering (HAC) algorithm
is also processed for clustering of users in the public domain by which the overhead
decreases effectively. As a final system, this work develops an integrated framework
by combining the CP-ABE with AES, multistage encryptor and limited-shuffle. As it
is combined with individual methods, this method achieves an efficient performance
in the provision of security and data confidentiality.
K. K. Chennam
CSE Department, Muffakham Jah College of Engineering and Technology, Telangana State,
Hyderabad, India
R. Aluvalu · S. Shitharth (B)
CSE Department, Vardhaman College of Engineering, Telangana State, Hyderabad, India
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 13
S. K. Das et al. (eds.), Architectural Wireless Networks Solutions
and Security Issues, Lecture Notes in Networks and Systems 196,
https://doi.org/10.1007/978-981-16-0386-0_2
14 K. K. Chennam et al.
1 Introduction
Cloud computing standards are gaining an increased research interest by the different
influences. The major benefit involves time savings, with reduced cost and effi-
cient utilization of computing resources. Though there are so many influences with
cloud computing, security and privacy problems are the important problems holding
back the extensive adaption of this automation. The general characteristic of cloud
computing technology requires the clients to store their data on third-party cloud
service providers, which can also be termed as outsourcing of data. The security
and privacy are generally maintained by the CSP where the data proprietors do not
have complete control on the data security, malicious nature of service provider and
third-party users is one more issue which cannot be traceable by data proprietors.
Hence, finding the appropriate solutions to these security issues at both administrator
level and client level is very important in various directions.
Earlier research is based on standard encryption algorithms like AES, data encryp-
tion standard (DES), etc. However, the advancement in the technology makes these
approaches ineffective because of the lack of control on authorization and authen-
tication. In contrast, the attribute-based encryption (ABE) was the new research
which has the desire to give the maximum to handle by the data proprietors who
can give the data and also provide an efficient management for the cloud service
provider. However, the ABE-based approaches provide security at the cost of execu-
tion. Therefore, the challenge of achieving the dual goals of privacy preserving with
effective cloud data sharing remains unresolved.
In summary, the major significant addition in the section is to influence by the
benefits of the ABE application to carry out the real-time answers to security and
privacy problems experienced in the cloud computing environments.
Section 1 discusses the introduction about cloud computing, data security and
access control schema. Section 2 discusses the CP-ABE with AES, Sect. 3 discusses
the CEASE, and Sects. 4 and 5 talk about the partial shuffling with two-stage
encryption and integration model. Last section discusses the results and conclusion.
Security, privacy and trust issues are existing and given importance since the evolu-
tion of Internet, and they are widely spoken these days because of cloud computing.
Cloud’s dynamic nature demands higher security levels. Users or organizations
subscribed to cloud for running their business processes are strikes to acquiring the
next level of endanger because of expanded applications. A cloud user while saving
the data on the cloud, which wants to make sure if the data is correctly stored and
can be retrieved later. The service provider must ensure the secure infrastructure to
protect the data and applications of its clients and the users. Various security strategies
proposed earlier have become ineffective due to advancements in technology.
An Authentication Model with High Security for Cloud Database 15
This is not the usual CSP and the user for both imaginations. What is required
is a mechanism that assures data consistency to the cloud user and protects that the
user is not some malicious hacker. Hence, the necessity for developing trust-based
security model is the need of the hour.
Cloud computing applications have to ensure security of the data stored in the cloud.
Existing approaches are suffering from various drawbacks and require improvement.
In particular, the proposed scheme has the following objectives:
(a) Dual optimization: Data confidentiality and processing time are the two main
constraints which are not achieved simultaneously. More processing time
(encryption time + decryption time) is required to achieve an efficient data
security for data stored in the cloud. On the other hand, the less computa-
tional operations to encrypt the data will reduce the data confidentiality and
result in an information loss. To meet these two constraints simultaneously, this
research work focuses on developing an effective cloud computing technique
based on the ABE [1] and multistage encrypt-or. By adding some more stan-
dard techniques (AES and limited-shuffle) with these approaches, this work
tries to achieve the data confidentiality and less processing time.
(b) Increase data confidentiality: To achieve increased hot data confidentiality and
preservation of privacy, this work proposes a CEASE. In this approach, an
advanced encryption standard accomplishes an encryption algorithm to reduce
the effect of curious/malicious administrator.
(c) Resilient to inference attacks: To make the system more secure from infer-
ence attacks and from malicious authority attacks, this work proposes a
single-level block index method along with limited-shuffle, by which the
system acquires data accomplished models off the record without reducing
the querying process.
(d) Reduced computational overhead: To reduce the unnecessary computational
overhead in the large-scale cloud storages, this work accomplishes a clustering
mechanism, called HAC supports based with the place of utilizers.
This section proposed access control within database strategy, CP-ABE combined
with standard AES algorithm. Here CP-ABE [2] achieves the authenticated accessing
of only legal users and AES ensures the data security. Before uploading data to the
cloud, it is encrypted through AES algorithm by which the data user will be relaxed
about the data security. Further in CP-ABE, proprietor accommodates attributes set,
when the user wants the data accomplishment which needs the attributes set and
16 K. K. Chennam et al.
requires the secret key for decrypting the data, where encrypt-or accommodates the
key with the strategy of the access control plan of action. Though administrators
are curious about the data, due to the non-availability of key, the data cannot be
accessed by that malicious authority [3]. Hence, this method protects the security
from malicious authority more effectively [4].
The proposed strategy gives cloud document for the security space with respect
to performance metrics like key generation time, encryption and decryption time.
The key generation time is computed with various secret keys with the identified
set attributes. To produce non-public key in CP-ABE with AES is not exactly the
same by CP-ABE with bilinear mapping. It is observed that, for every attributes set,
the obtained key generation time is less when contrast to the conventional CP-ABE
with bilinear. The encryption time and decryption time are computed with various
no. of policy of leaf nodes, which is limited in CP-ABE with AES contrast with
CP-ABE with bilinear mapping. CP-ABE with AES gives protection and security
for data records for the information of the cipher and store in cloud. The CP-ABE
with AES gives limited key generation, encryption time when contrasted by CP-ABE
with bilinear mapping.
4 CEASE
The CEASE is outlined in this section; main objective of CEASE is to provide data
confidentiality and access control of outsourced CS information over the security
threats. The proposed CEASE framework comprises three constituents to protect the
cloud data security:
(a) Accomplishment of AES on sensitive patient health records.
(b) Secure information retrieval through a data accomplishes and direct technique
and query encryption.
(c) Data confidentiality for hot data through limited-shuffle to protect the data
from inference attacks.
Initially, the holder of data modifies the loyal proxy server by extending AES on
the health data before transferring it to CSP. Ordinal, the proxy server is the important
attribute set administration recognizes the individuals applying the set of attributes
and overdrives access control plan of action on electronic information inward cloud.
The encrypted queries retrieve the encrypted data from the cloud and to decrypt
the data using attributes in the proxy server before delivering information to the
final consumer. Nevertheless, retrieving encrypted information of ciphertext assures
high confidentiality of every patient record in the cloud, and there is a possibility of
inference attacks. Thirdly, the CEASE techniques apply the limited-shuffle within a
single block of the data that contains the sensitive health records and protects the data
confidentiality aside from swift retrieval. Thus, the recommended CEASE algorithm
protects malicious authority of cloud unable to take or change (hot) information one
of two is treasure delicate health files or encrypted query execution along with the
An Authentication Model with High Security for Cloud Database 17
faster querying process [5]. The performance metrics such as querying cost, storage
overhead and hot data confidentiality are examined on the recommended method.
The decryption algorithm decrypts the data and sends the plain text to the client when
the set of attributes are matched according to the CP-ABE with AES.
The performance evaluation of recommended CEASE is carried out on the JAVA
platform on a personal health records. The performance metrics such as querying cost,
storage overhead and hot data confidentiality are measured for varying data sizes.
From the simulation results, it is proved that the recommended approach shows
slight increase in the querying cost but reduced storage overhead and finally an
improvement in the hot data confidentiality contrast with existing approach.
Algorithm 1 Decryption algorithm
getting opportunities designated from the sick person. Here each client achieves the
Vigenere encryption-based system to manage the decoding by receiving awards of
customers in his/her PSD. In public domain (PUD), two-fish encryption is used by
the attendant of diverse AAs, each one directing a disjoint subset of characters [6,
7]. To regulate approaches by the PUD wards and let on to reflect role-oriented fine-
grained approaches for their PHR documents, while they do not require the sanctioned
users at the time of encryption. The PUDs contain the maximum number of wards.
By coming through the difficulty, here this approach groups the ward’s duty in the
PUD with HAC algorithm. Wards of PUDs get back attribute designated encryption
keys supported with the ward functions. The observational maps about encryption,
decryption time, clustering accuracy and storage requirements are evaluated using
various data set sizes. The observational effect shows that the recommended method
has more clustering quality, less encryption and decryption time.
This section integrates the CP-ABE with AES and two-stage encrypt-or with limited-
shuffle [8]. The primary goal of CP-ABE with AES is to recognize the malicious
clients and data proprietors who can access data from the cloud. Next, the multistage
encrypt-or helps in reducing the extra computational overhead [9]. The electronic
records are protected from inference attacks by applying limited-shuffle as shown in
Fig. 1. The data proprietors are maintaining the keys distribution authority, certificate
verification and attribute authority and send the data to the proxy server. The proxy
server applied two-stage encryption techniques based on the domains mentioned
above, while doing encryption the key pairs are received from elliptic curve. The
encrypted data is stored in the cloud database. The proxy server encrypts data before
storing in cloud and plain queries also encrypted by proxy server before retrieving
data from cloud, where there is no possibility of plain data to the malicious admin
in cloud and in network or in proxy server.
Two-fish algorithm uses with different and random key length of variable size
of 128 bits, 192 bits and 256 bits. Two-fish is a symmetric algorithm with quick
encryption great with AES due to its speed, adaptability and protection outline.
For every query, the database needs to be searched line by line in the table, where
the questioning time is expanded as the information size is expanded straightly. To
address this issue, a record is made by information by examining the file is decent
as opposed to examining the entire information base. The entire information base
records are organized consecutively with the Customer ID. Before storing new data
into database by examine place by identification and a short time later by embed new
segment with the objective that masterminding demand should be kept up. Single-
level information square relies upon activity key, and the information is kept in
An Authentication Model with High Security for Cloud Database 19
squares. All information kept in the database is named as transparent record. Right
when the record is recovered from the information base, the information is changed to
dark. The flooded list rearranging is not required where transparent stamped records
are not recovered, and it is highly unlikely of spillage with transparent records. Dark
checked information is revamped high for entire single list information base after
each rearranging is finished. By rearranging the dark records is a constrained mix
strategy with the different information squares which outfit information mystery and
brisk questioning with the ordering [10, 11].
Protecting the pathological information initially by the access control plan of
action is used based on the user attributes which is CP-ABE and the informa-
tion is encrypted [12] by AES techniques by separating the security domain into
multiple areas one is non-public domain and another is public domain where cardinal-
independent encryption schemes are used for different domain, one is Vigenere
encryption used for non-public domain, and two-fish algorithm is used for PUD,
respectively, as shown in Fig. 2. The chance of information spillage of third-party
database provider of regular avenue example of records, to beat that the restricted
mix, is utilized with single square stockpiling and high security is given with the
method [13]. This strategy includes less key generation time, encryption time and
unscrambling period much as appeared differently in relation to spare CP-ABE plans,
eventually, centered on the distinctive encryption calculation to make sure about
pathological information.
20 K. K. Chennam et al.
7 Result Analysis
This section outlines results of the recommended schemes on the personal health
records (PHR). The entire recommended methodology is accomplished over the
PHR data set, and its performance is evaluated through the performance metrics
such as encryption time, decryption time, time taken to generate non-public key and
hot data confidentiality [14].
The overall research work is implemented in four phases to meet the defined
objectives.
1. Dual optimization through hybridizing CP-ABE and AES.
2. CEASE—Improving data confidentiality and developing resistance to inference
attacks through hybridizing CP-ABE, AES and implementing limited-shuffle.
3. Multistage encryption—Reduction in computational overhead by using multi-
stage encryption on hybridized CP-ABE with AES.
4. Integrating the multistage encryption model with limited-shuffle to further
reduce the computational overhead [15].
The information is scrambled before re-appropriating onto the cloud with
symmetric encryption using AES. This mechanism will restrict the unauthorized
users from accessing the data, and the administrator cannot decrypt the data as they
are not given access to keys. By utilizing this recommended model, the information
is made sure about AES encryption and CP-ABE containment strategy. CP-ABE
with bilinear mapping is in contrast to CP-ABE with AES on different parameters.
The key age time is decreased utilizing the recommended system. It is seen that
CP-ABE with bilinear mapping is procuring tremendous time to generate key than
An Authentication Model with High Security for Cloud Database 21
the CP-ABE with AES. The plain information is scrambled before re-appropriating
the information in cloud to shield the information from the pernicious manager. The
encryption time is diminished in CP-ABE with AES in contrast to CP-ABE with
bilinear mapping and KP-ABE. The customer needs to unscramble the informa-
tion, and the decoding times for CP-ABE with AES are lessened in contrast to the
CP-ABE with bilinear mapping and KP-ABE. Ciphertext varies less and has more
safety measures in both recommended and existing techniques. Furthermore, the
recommended CEASE calculation makes sure that the vigorous admin of third-party
database cannot recover any (hot) information from the delicate records.
The CEASE scheme enforces the recommended method performance. This
method is resolved by various levels in the access control plan of action, encrypted
database to store in third-party database and limited-data shuffling. The performance
of CEASE scheme is in contrast to the encryption scheme integrated with an access
control (EIAC). Querying cost is defined as the time taken to fetch the query result
against encrypted database, data encryption and decryption time. The querying cost
is slightly increased with the database size, but the storage overhead is less and hot
data confidentiality is in more contrast to the existing methods.
Thirdly multistage encrypt-or model is tested on the personal health records. As
the number of users on the public domain may be high, securing the data access
is a complex issue. Hence, two-stage encryption model is developed. For a user
located in the personal domain, this approach adopts Vigenere encryption algo-
rithm, and for a user located in the public domain this approach adopts two-fish
encryption algorithm. For each personal domain, the data proprietor is connected in
a chain fashion through his/her generations and dear one, which may retrieve personal
records in view of access given by the data proprietor. Here every data proprietor
uses Vigenere encryption algorithm, maintains the decrypting key and requires sanc-
tions of his/her wards in his/her personal. The key generation is completely carried
through the elliptic curve method. The generation of key pairs is only allowed after
the authentication of the user.
In the public domain, the users are clustered through HAC algorithm. Based on
the roles and responsibilities of the users, they are clustered into some groups in a
hierarchical fashion. Finally, the performance is measured through the performance
metrics such as encryption time, decryption time, storage requirement and clustering
accuracy for varying data sizes.
Multistage with two-fish and Vigenere encryption is in contrast to the existing
blowfish algorithm. Further the multistage method is evaluated through clustering
accuracy. Here the clustering accuracy is measured as the number of users grouped
into public and personal domains. Since the clustering also plays an important role
in the security provision, the performance of recommended approach is measured by
varying the data size, and for every instant the clustering accuracy is measured and
formulated. Two-fish and Vigenere encryption and decryption time are in contrast to
the existing blowfish algorithm, and results are tabulated [16, 17].
Finally, an integrated approach using CP-ABE with AES and multistage encrypt-
or exhibited high performance through limited-shuffle. The final model is constructed
by merging the CP-ABE with AES, multistage encrypt-or and limited-shuffle. The
22 K. K. Chennam et al.
main objective of CP-ABE with AES is to perceive the malicious clients or admin-
istrator and not giving access for unauthorized users to analyze the data in the cloud.
This has demonstrated that the recommended strategy encryption time and unscram-
bling time are not exactly the other CP-ABE plans. To encode the information before
outsourcing by isolating the PUD and PSD, encryption is diminished, comparably
unscrambling time likewise decreased in this recommended strategy.
In key generation time, secret keys with various numbers of set of attributes which
match the equivalent sets based on the leafy nodes, and the keys are generated as
shown in Fig. 3. Figures 4 and 5 show the encryption and decryption time for various
database sizes, respectively, with the matched attributes sets. Figure 6 shows the
clustering accuracy for different database sizes with HAC algorithm. The multi-
stage encrypt-or helps in reducing the additional computational overhead which is
acquired by separating all users into clusters. This methodology endeavors to shield
the electronic records from inference attacks through the accomplishment of limited-
shuffle [18, 19]. The key generation and information retrieval time are limited in the
developed model in contrast to various CP-ABE and KP-ABE techniques.
8 Conclusions
This considered the implementation of CP-ABE with AES and two-stage encrypt-or
exhibiting high performance through limited-shuffle. In this work, initially CP-ABE
24 K. K. Chennam et al.
with AES is developed and proved reduced key generation time. Secondly, CEASE is
developed to use query encryption method to retrieve results from database. Thirdly,
multistage encryption model using two-fish and Vigenere is developed.
Here the users are divided into non-public and public domains, and HAC clustering
is used to further divide the users into groups. This work is evaluated by performance
metric and clustering accuracy [20]. Performance of HAC approach is also measured
by varying the data size for every instance. Finally, the integrated model is developed
using CP-ABE with AES and multistage encryption model through limited-shuffle.
Final work will endeavor to shield the electronic records from inference attacks
through the accomplishment of limited-shuffle. This model has majorly addressed
the below challenges, namely dual optimization to meet the equality between the
data confidentiality, and processing time is achieved with AES and limited-shuffle-
based ABE. Increased hot data confidentiality and privacy preservation are achieved
by reducing the effect of curious/malicious authority using an encryption algorithm
CEASE. Resilient to inference attacks from malicious authority is attained by infor-
mation access arrangement familiarity by not changing the querying process using
single-level block index method along with limited-shuffle. Reduced computational
overhead to reduce the unnecessary computational overhead is achieved by HAC
algorithm mechanism based on the roles of users. Future work is to reduce the cost
of recommended model by increasing the security in data.
Acknowledgements Thank you for your cooperation and the contribution of co-authors and
Springer for publishing the manuscript.
References
The present Japanese art has sadly strayed from subjectivity, the
only one citadel where the old Japanese art rose and fell; I wonder if
it is not paying a too tremendous price only to gain a little objectivity
of the West.
Printed by Hazell, Watson & Viney, Ld., London and Aylesbury, England.
*** END OF THE PROJECT GUTENBERG EBOOK THE SPIRIT OF
JAPANESE ART ***
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebooknice.com