Ticket-Based Schemes for Anonymity and Authentication on Wireless Mobile Networks
J. JayapradhaAssistant Professor, SRM Institute of Science and Technology, SRM Nagar, Kattankulathur, Tamil Nadu, India. jayapraj@srmist.edu.in0000-0002-2548-9135
Dr. Mardeni RosleeProfessor, Faculty of Engineering, Multimedia University, Cyberjaya, Malaysia. mardeni.roslee@mmu.edu.my0000-0001-8250-4031
T. Senthil KumarAssociate Professor, SRM Institute of Science and Technology, SRM Nagar, Kattankulathur, Tamil Nadu, India; Postdoctoral Research Fellow, Faculty of Engineering, Multimedia University, Cyberjaya, Malaysia. senthilt2@srmist.edu.in0000-0002-2200-3339
Dr. Chilakala SudhamaniPostdoctoral Research Fellow, Faculty of Engineering, Multimedia University, Cyberjaya, Malaysia. sudhamanich@gmail.com0000-0002-8823-9053
Azmi IsmailCentre of Excellence for Intelligent Network, Telekom Malaysia Research & Development Cyberjaya, Malaysia. azmi@tmrnd.com.my0000-0001-5792-9601
Anwar Faizd OsmanSpectre Solution Sdn Bhd, Malaysia. anwarfaizd@spectresolution.com0000-0001-9563-9138
Dr. Fatimah Zaharah AliUniversiti Teknologi MARA, Faculty of Electrical Engineering, Shah Alam, Selangor, Malaysia. fatimah_zaharah@uitm.edu.my0000-0002-5467-4049
Idris Olalekan AdeoyeCentre for Wireless Technology, Faculty of AI & Engineering, Multimedia University Cyberjaya, Malaysia. idreezleks@gmail.com0009-0008-3450-7519
In wireless mobile networks (WMN), user anonymity and authentication are needed to protect the personal information of the user and the integrity of data, respectively. In this work, a ticket-based anonymity and authentication technique using an optimized algorithm called WMN_TAA-QPSO is developed. In this model, a ticket is employed to convey the query request message from the sender to the location server via a set of dummy senders established around the base station. The QPSO algorithm is also applied to locate a central node out of the neighboring base stations of the serving base station. The encrypted query message maintains security. In this respect, the misbehaving nodes were unable to access the private information of the user. As the problem described above, simulation results also demonstrate that this technique will enhance the Authentication Success Ratio (ASR) and reduce both the Authentication Delay (AD) and Communication Overhead (CO).