{"title":"改进SFO算法在物联网应用无线移动自组网中提高QoS的实现","authors":"Satyanarayana Pamarthi, N. R.","doi":"10.1109/wispnet54241.2022.9767175","DOIUrl":null,"url":null,"abstract":"Adhoc networks are becoming a new wireless networking technology built for mobile hosts that are becoming more popular. Instead of relying on fixed infrastructure, ad hoc networks, as opposed to standard mobile wireless networks, are completely mobile. In this paper, we introduce a security mechanism in which packets are encoded and decoded using an arbitrary method selection scheme. The recommended model's functionality is assessed, and it is discovered that there was no reduction in control overhead, however a little delay has been introduced as a result of the authentication approach. Our outcome is that the recommended security architecture will function well for heavily loaded systems with a high mobility and that it may be updated to include other cryptographic algorithms in future versions. Ultimately, the quantitative analysis is carried out, where for the instance of length of the character set to 100; the suggested modified SFO ultimately outperformed to those already in use, with cost function being 22 % significantly greater than available PSO, 20% significantly bigger than available GWO, 19% significantly greater than available WOA as well as 21 % bigger than available SFO. The comparison study with conventional models confirms the suggested model's gives effective performance in terms of dissimilar analysis.","PeriodicalId":432794,"journal":{"name":"2022 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implementation of Modified SFO Algorithm to Enhance QoS in Wireless Mobile Adhoc Networks for IoT Applications\",\"authors\":\"Satyanarayana Pamarthi, N. R.\",\"doi\":\"10.1109/wispnet54241.2022.9767175\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Adhoc networks are becoming a new wireless networking technology built for mobile hosts that are becoming more popular. Instead of relying on fixed infrastructure, ad hoc networks, as opposed to standard mobile wireless networks, are completely mobile. In this paper, we introduce a security mechanism in which packets are encoded and decoded using an arbitrary method selection scheme. The recommended model's functionality is assessed, and it is discovered that there was no reduction in control overhead, however a little delay has been introduced as a result of the authentication approach. Our outcome is that the recommended security architecture will function well for heavily loaded systems with a high mobility and that it may be updated to include other cryptographic algorithms in future versions. Ultimately, the quantitative analysis is carried out, where for the instance of length of the character set to 100; the suggested modified SFO ultimately outperformed to those already in use, with cost function being 22 % significantly greater than available PSO, 20% significantly bigger than available GWO, 19% significantly greater than available WOA as well as 21 % bigger than available SFO. The comparison study with conventional models confirms the suggested model's gives effective performance in terms of dissimilar analysis.\",\"PeriodicalId\":432794,\"journal\":{\"name\":\"2022 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET)\",\"volume\":\"117 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/wispnet54241.2022.9767175\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/wispnet54241.2022.9767175","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementation of Modified SFO Algorithm to Enhance QoS in Wireless Mobile Adhoc Networks for IoT Applications
Adhoc networks are becoming a new wireless networking technology built for mobile hosts that are becoming more popular. Instead of relying on fixed infrastructure, ad hoc networks, as opposed to standard mobile wireless networks, are completely mobile. In this paper, we introduce a security mechanism in which packets are encoded and decoded using an arbitrary method selection scheme. The recommended model's functionality is assessed, and it is discovered that there was no reduction in control overhead, however a little delay has been introduced as a result of the authentication approach. Our outcome is that the recommended security architecture will function well for heavily loaded systems with a high mobility and that it may be updated to include other cryptographic algorithms in future versions. Ultimately, the quantitative analysis is carried out, where for the instance of length of the character set to 100; the suggested modified SFO ultimately outperformed to those already in use, with cost function being 22 % significantly greater than available PSO, 20% significantly bigger than available GWO, 19% significantly greater than available WOA as well as 21 % bigger than available SFO. The comparison study with conventional models confirms the suggested model's gives effective performance in terms of dissimilar analysis.