Abstract

Ad hoc mobile cloud computing networks are affected by various issues, like delay, energy consumption, flexibility, infrastructure, network lifetime, security, stability, data transition, and link accomplishment. Given the issues above, route failure is prevalent in ad hoc mobile cloud computing networks, which increases energy consumption and delay and reduces stability. These issues may affect several interconnected nodes in an ad hoc mobile cloud computing network. To address these weaknesses, which raise many concerns about privacy and security, this study formulated clustering-based storage and search optimization approaches using cross-layer analysis. The proposed approaches were formed by cross-layer analysis based on intrusion detection methods. First, the clustering process based on storage and search optimization was formulated for clustering and route maintenance in ad hoc mobile cloud computing networks. Moreover, delay, energy consumption, network lifetime, and link accomplishment are highly addressed by the proposed algorithm. The hidden Markov model is used to maintain the data transition and distributions in the network. Every data communication network, like ad hoc mobile cloud computing, faces security and confidentiality issues. However, the main security issues in this article are addressed using the storage and search optimization approach. Hence, the new algorithm developed helps detect intruders through intelligent cross layer analysis with the Markov model. The proposed model was simulated in Network Simulator 3, and the outcomes were compared with those of prevailing methods for evaluating parameters, like accuracy, end-to-end delay, energy consumption, network lifetime, packet delivery ratio, and throughput.

Highlights

  • Ad hoc mobile cloud computing networks are arranged with several wireless communicating nodes [1]

  • This paper presents a simple and effective way of solving this problem and improving the cross-layer analysis based on the intrusion detection performance

  • The developed clustering-based storage and search optimization approach is simulated using Network Simulator 3 (NS-3) to calculate the performance parameters, like the end-to-end delay, the energy consumption, the network lifetime, the packet delivery ratio, and the throughput

Read more

Summary

Introduction

Ad hoc mobile cloud computing networks are arranged with several wireless communicating nodes [1]. The hidden Markov model works with high stability in terms of exact data transition and distributions This model helps identify and prevent intrusions to address the security issues and confidentiality concerns of adhoc mobile cloud computing networks [5]. Like the ad hoc on-demand distance vector, the border gateway protocol, location aided routing, optimized link state routing, open shortest path first, the routing information protocol, and the zone routing protocol, are used to enhance data communication. The hidden Markov model is used for stable data transition and distributions by preventing intrusions This model helps address the security issues and confidentiality concerns of the adhoc mobile cloud computing network.

Related Works
Problem Definition
System Model
Proposed System Architecture
Anomaly Detection with the Hidden Markov Model
Findings
Result and Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.