An Efficient Unique Tokenized Authentication Technique Based Data Offloading Approach Using Key Exchange to Maintain Data Integrity in Heterogeneous Networks

Ramesh Mandali,B. Tirapathi Reddy,Mandali, Ramesh,Tirapathi Reddy, B.
DOI: https://doi.org/10.1007/s42979-023-02047-x
2023-09-10
SN Computer Science
Abstract:In the current period, the number of mobile users is rapidly expanding with a complicated network setup with a large amount of network traffic, which results in data overload. Insufficient network bandwidth causes data overloading. Data overloading can be mitigated by implementing a potential solution to deal with the massive network traffic. Despite the fact that the capabilities of mobile networks are rapidly expanding, the aforementioned issue persists as we move from cellular to advanced wireless networks. To keep up with the ever-increasing number of internet users, offloading techniques have become increasingly popular in mobile computing. As the number of users and the volume of data they generate grows, the network's capacity is taxed, and this is where offloading techniques come in to help. However, in many situations, authentication is absolutely necessary for the formation of a connection. As a result, the study presents a data offloading method for mobile computing that is both safe and cost-effective, as well as successful in managing network traffic. Individuals' personal information might also constitute a severe privacy risk to users. Anticipating the legitimacy of the nodes and secret key negotiation helps avoid these dangers. Developing a mutual authentication and secret key exchange system for resource-constrained networks that is secure and private in all ways is a difficult challenge. Integrate key exchange authentication with an efficient data offloading approach to maintain data confidentiality and integrity in the whole network during transmission is the primary goal of the research. This research presents a Unique Tokenized Authentication Technique based Data Offloading approach using Key Exchange (UTAT-DO-KE) model is proposed in this research for maintaining data integrity in heterogeneous networks during data communication. In this case, performance analysis can be done to lower the time it takes to authenticate and run the application. When compared to the current procedures, the proposed model will improve network performance while simultaneously reducing data traffic.
What problem does this paper attempt to address?