A Novel Approach by Integrating Dynamic Network Selection and Security Measures to improve Seamless Connectivity in Ubiquitous Networks

Full Text (PDF, 569KB), PP.29-42

Views: 0 Downloads: 0


Prasanna Kumar G. 1,* Shankaraiah N. 2 Rajashekar M B 3 Sudeep J 1 Shruthi B S 1 Darshini Y 1 Manasa K B 1

1. Department of Information Science & engineering, The National Institute of Engineering, Mysuru, 570018, India

2. Department of Electronics and Communication engineering, Sri Jayachamarajendra College of Engineering, Mysuru, 570006, India

3. Department of computer Science & engineering, GSSS Institute of Engineering & Technology for Women, Mysuru, 570016, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2024.01.03

Received: 16 Aug. 2023 / Revised: 30 Sep. 2023 / Accepted: 15 Oct. 2023 / Published: 8 Feb. 2024

Index Terms

Ubiquitous Network, reliability, Handover Efficiency, Throughput, Sidechaining


Researchers have developed an innovative approach to ensure seamless connectivity in ubiquitous networks with limited or irregular network coverage. The proposed method leverages advanced network technologies and protocols to seamlessly establish and maintain network connections across various environments. It integrates multiple wireless communication technologies and dynamic network selection algorithms, overcoming issues like poor reliability, limited scalability, and security problems. Compared to existing solutions, the method exhibits improved connection handover efficiency, network throughput, and end-to-end delay. Considering user mobility, network availability, and quality of service needs, it makes informed decisions about the most suitable network connections. The proposed method is expected to significantly impact the development of future ubiquitous networking solutions.

Cite This Paper

Prasanna Kumar G, Shankaraiah N, Rajashekar M B, Sudeep J, Shruthi B S, Darshini Y, Manasa K B, "A Novel Approach by Integrating Dynamic Network Selection and Security Measures to improve Seamless Connectivity in Ubiquitous Networks", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.14, No.1, pp. 29-42, 2024. DOI:10.5815/ijwmt.2024.01.03


[1]Serhane, Oussama, Khadidja Yahyaoui, Boubakr Nour, and Hassine Moungla. "A survey of ICN content naming and in-network caching in 5G and beyond networks." IEEE Internet of Things Journal 8, no. 6 (2020): 4081-4104.
[2]Al Azad, Md Washik, Reza Tourani, Abderrahmen Mtibaa, and Spyridon Mastorakis. "Harpocrates: Anonymous data publication in named data networking." In Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, pp. 79-90. 2022.
[3]Huang, Xiaoge, Yifan Cui, Qianbin Chen, and Jie Zhang. "Joint task offloading and QoS-aware resource allocation in fog-enabled Internet-of-Things networks." IEEE Internet of Things Journal 7, no. 8 (2020): 7194-7206.
[4]Zeng, Luyuan, Wushao Wen, and Chongwu Dong. "QoS-aware Task Offloading with NOMA-based Resource Allocation for Mobile Edge Computing." In WCNC, pp. 1242-1247. 2022.
[5]Sarkar, Indranil, Mainak Adhikari, Neeraj Kumar, and Sanjay Kumar. "A collaborative computational offloading strategy for latency-sensitive applications in fog networks." IEEE Internet of Things Journal 9, no. 6 (2021): 4565-4572.
[6]Dai, Cui-Qin, Mingjian Zhang, Chong Li, Jian Zhao, and Qianbin Chen. "QoE-aware intelligent satellite constellation design in satellite internet of things." IEEE Internet of Things Journal 8, no. 6 (2020): 4855-4867.
[7]Alsaeedi, Mohammed, Mohd Murtadha Mohamad, and Anas A. Al-Roubaiey. "Toward adaptive and scalable OpenFlow-SDN flow control: A survey." IEEE Access 7 (2019): 107346-107379.
[8]Elsmany, Eyman Fathelrhman Ahmed, Mohd Adib Omar, Tat-Chee Wan, and Altahir Abdalla Altahir. "EESRA: Energy efficient scalable routing algorithm for wireless sensor networks." IEEE Access 7 (2019): 96974-96983.
[9]Wang, Tianyu, Shaowei Wang, and Zhi-Hua Zhou. "Machine learning for 5G and beyond: From model-based to data-driven mobile wireless networks." China Communications 16, no. 1 (2019): 165-175.
[10]Gurumallu, Prasanna Kumar and Shankaraiah. “NLADSS: Design of Connectivity as a Service (CaaS) Model using Node-Level Augmentation & Dynamic Sleep Scheduling for Heterogeneous Wireless Network Handoffs.” International Journal of Intelligent Engineering and Systems 15, no. 5 (2022): 273-283.
[11]Jadey, Sudeep, et al. "Introduction to Cyber Security." Methods, Implementation, and Application of Cyber Security Intelligence and Analytics, edited by Jena Om Prakash, et al., IGI Global, 2022, pp. 1-24. https://doi.org/10.4018/978-1-6684-3991-3.ch001.
[12]Wu, Yuansheng, Guanqun Zhao, Dadong Ni, and Junyi Du. "Dynamic handoff policy for RAN slicing by exploiting deep reinforcement learning." EURASIP Journal on Wireless Communications and Networking 2021, no. 1 (2021): 1-17.
[13]Sun, Jiani, Zhihong Qian, Xin Wang, and Xue Wang. "Es-dqn-based vertical handoff algorithm for heterogeneous wireless networks." IEEE Wireless Communications Letters 9, no. 8 (2020): 1327-1330.
[14]Wang, Weijia, and Lei Hu. "A secure and efficient handover authentication protocol for wireless networks." Sensors 14, no. 7 (2014): 11379-11394.
[15]Wang, Shumin, Honggui Deng, Rujing Xiong, Gang Liu, Yang Liu, and Hongmei Liu. "A multi-objective model-based vertical handoff algorithm for heterogeneous wireless networks." EURASIP Journal on Wireless Communications and Networking 2021, no. 1 (2021): 1-18.
[16]Yang, Yizhou, Zitong Liu, Guanxin Zhang, Xisha Zhang, and Deqing Zhang. "The effects of side chains on the charge mobilities and functionalities of semiconducting conjugated polymers beyond solubilities." Advanced Materials 31, no. 46 (2019): 1903104.
[17]Singh, Amritraj, Kelly Click, Reza M. Parizi, Qi Zhang, Ali Dehghantanha, and Kim-Kwang Raymond Choo. "Sidechain technologies in blockchain networks: An examination and state-of-the-art review." Journal of Network and Computer Applications 149 (2020): 102471.
[18]Doyle, Joseph, Muhammed Golec, and Sukhpal Singh Gill. "Blockchainbus: A lightweight framework for secure virtual machine migration in cloud federations using blockchain." Security and Privacy 5, no. 2 (2022): e197.
[19]Bouras, Mohammed Amine, Boming Xia, Adnan Omer Abuassba, Huansheng Ning, and Qinghua Lu. "IoT-CCAC: a blockchain-based consortium capability access control approach for IoT." PeerJ Computer Science 7 (2021): e455.
[20]Li, Taotao, Mingsheng Wang, Zhihong Deng, and Dongdong Liu. "Sepow: Secure and efficient proof of work sidechains." In Algorithms and Architectures for Parallel Processing: 21st International Conference, ICA3PP 2021, Virtual Event, December 3–5, 2021, Proceedings, Part III, pp. 376-396. Cham: Springer International Publishing, 2022.
[21]Letaief, Khaled B., Wei Chen, Yuanming Shi, Jun Zhang, and Ying-Jun Angela Zhang. "The roadmap to 6G: AI empowered wireless networks." IEEE communications magazine 57, no. 8 (2019): 84-90.
[22]Nurgaliyev, Madiyar, Ahmet Saymbetov, Yevhen Yashchyshyn, Nurzhigit Kuttybay, and Didar Tukymbekov. "Prediction of energy consumption for LoRa based wireless sensors network." Wireless Networks 26 (2020): 3507-3520.
[23]Ahmed, Shakil, Mostafa Zaman Chowdhury, and Yeong Min Jang. "Energy-efficient UAV-to-user scheduling to maximize throughput in wireless networks." IEEE Access 8 (2020): 21215-21225.
[24]Tardioli, Danilo, Ramviyas Parasuraman, and Petter Ögren. "Pound: A multi-master ROS node for reducing delay and jitter in wireless multi-robot networks." Robotics and Autonomous Systems 111 (2019): 73-87.
[25]Wang, Shumin, Honggui Deng, Rujing Xiong, Gang Liu, Yang Liu, and Hongmei Liu. "A multi-objective model-based vertical handoff algorithm for heterogeneous wireless networks." EURASIP Journal on Wireless Communications and Networking 2021, no. 1 (2021): 1-18.
[26]Mouaffak, Abdelhak El, and Abdelbaki El Belrhiti El Alaoui. "Considering the environment's characteristics in wireless networks simulations: case of the simulator NS2 and the WSN." International Journal of Information and Communication Technology 14, no. 4 (2019): 427-438.
[27]Glorot, Xavier, and Yoshua Bengio. "Understanding the difficulty of training deep feedforward neural networks." In Proceedings of the thirteenth international conference on artificial intelligence and statistics, pp. 249-256. JMLR Workshop and Conference Proceedings, 2010.
[28]Cortes, Corinna, Mehryar Mohri, and Afshin Rostamizadeh. "L2 regularization for learning kernels." arXiv preprint arXiv:1205.2653 (2012).
[29]Zhang, Zijun. "Improved adam optimizer for deep neural networks." In 2018 IEEE/ACM 26th international symposium on quality of service (IWQoS), pp. 1-2. Ieee, 2018.
[30]Gulrajani, Ishaan, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron C. Courville. "Improved training of wasserstein gans." Advances in neural information processing systems 30 (2017).
[31]Chaudhry, Shikha. "An encryption-based secure framework for data transmission in IoT." In 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), pp. 743-747. IEEE, 2018.