Abstract
The offloading techniques have become more prominent among the mobile computing due to the increased number of users and enormous amount of information flowing through the internet. The offloading techniques enhance the competence of the mobile computing by reducing the congestion in the network caused by increased number of users and the enormous data traffic experienced. However in many cases the authentication becomes very essential for the connection establishment. So the paper proposes a secure and cost efficient data offloading technique for the mobile computing to make it safe, secure with an effective management of network traffic. The performance analysis of the security measures proffered in the paper for authentication of the offloading techniques in terms of the security, cost and the delay in the offloading ensures that the proposed method is superior to the existing methods.
References
Srinivasan, Devaraj, Jayanta Dey, S. M. Kumar, and Romendra Nath Mukherjee. "Data Offload approaches for Mobile operators-Improving Network Efficiency and Strengthening quality of service." Wipro Council for Industry Research (2012).
Hinger, Deepshikha, and Dhananjay Kalbande. "Review of mobile data offloading through Wi-Fi." In 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA), pp. 425-429. IEEE, 2014.
Aijaz, Adnan, Hamid Aghvami, and Mojdeh Amani. "A survey on mobile data offloading: technical and business perspectives." IEEE Wireless Communications 20, no. 2 (2013): 104-112.
Pawar, Ashwini R., S. S. Bhardwaj, and Sachin N. Wandre. "Mobile data offloading techniques and related issues." International Journal of Advanced Research in Computer Engineering & Tech.(IJARCET) 4 (2015): 1367-1371.
Rebecchi, Filippo, Marcelo Dias De Amorim, Vania Conan, Andrea Passarella, Raffaele Bruno, and Marco Conti. "Data offloading techniques in cellular networks: A survey." IEEE Communications Surveys & Tutorials 17, no. 2 (2014): 580-603.
Ding, Aaron Yi, Bo Han, Yu Xiao, Pan Hui, Aravind Srinivasan, Markku Kojo, and Sasu Tarkoma. "Enabling energy-aware collaborative mobile data offloading for smartphones." In 2013 IEEE International Conference on Sensing, Communications and Networking (SECON), pp. 487-495. IEEE, 2013.
Zhou, Huan, Hui Wang, Xiuhua Li, and Victor CM Leung. "A survey on mobile data offloading technologies." IEEE Access 6 (2018): 5101-5111.
Wang, Tong, Pengcheng Li, Xibo Wang, Yunfeng Wang, Tianhao Guo, and Yue Cao. "A comprehensive survey on mobile data offloading in heterogeneous network." Wireless Networks 25, no. 2 (2019): 573-584.
Dbouk, Toufic, Azzam Mourad, Hadi Otrok, Hanine Tout, and Chamseddine Talhi. "A novel ad-hoc mobile edge cloud offering security services through intelligent resource-aware offloading." IEEE Transactions on Network and Service Management (2019).
Hernandez, Leonel, Jair Carbonó, and Andres Cantillo. "Expand the internet access in an urban park using a Wi-Fi offloading technique." Bulletin of Social Informatics Theory and Application 3, no. 1 (2019): 1-12.
Jose, Liji A., and C. Hemanth. "Modelling and Performance Analysis of Wi-fi Offloading." In Wireless Communication Networks and Internet of Things, pp. 33-39. Springer, Singapore, 2019.
Khoshnoudi, Ali, Rasool Sadeghi, and Farhad Faghani. "Performance Improvement of Data Offloading using Multi-rate IEEE 802.11 WLAN." Majlesi Journal of Electrical Engineering 13, no. 1 (2019): 121-126.
Premalatha, M. S., and B. Ramakrishnan. "OPTIMAL RSA BASED COST EFFECTIVE OFFLOADING SCHEME IN MOBILE CLOUD COMPUTING."
Feldhofer, Martin, Sandra Dominikus, and Johannes Wolkerstorfer. "Strong authentication for RFID systems using the AES algorithm." In International Workshop on Cryptographic Hardware and Embedded Systems, pp. 357-370. Springer, Berlin, Heidelberg, 2004.
Mirjalili, Seyedali, and Andrew Lewis. "The whale optimization algorithm." Advances in engineering software 95 (2016): 51-67.
