Researcher Collab

An improved SSH optimization model for wireless security in Complex networks

The SSH (Secure Shell) protocol has been widely utilized for secure and remote access of devices over a network. However, as wireless networks become more complicated, there is a requirement for an enhanced optimization model that can take care of the security challenges that these networks impose. This paper extends the SSH optimization to accommodate characteristics of complex wireless networks and puts forward a novel framework for its application. Second, our model is based on SSH communication with complex algorithms for key exchange and authentication, making your data more secure. The model also works with the present security mechanisms on wireless networks, like encryption methods and intrusion detection systems, to offer an allinclusive solution for enhanced security. Our model is also designed to be robust and resourceful against adversary behavior by utilizing learned dynamic parameters from wireless network environments. We evaluate the performance of our model through experiments and simulations in different complex wireless networks. Our optimization model can be optimal in terms of security, efficiency, and adaptability by comparing it with existing models. The model can be deployed to different Wireless Networks and offers a reliable solution for securing remote access & management.

Authors: Sheetal Temara, Devesh Tiwari, Vivek Kumar. M, Aditya Verma, Rishi Prakash Shukla, P. Jeyanthi

DOI: https://doi.org/10.1109/icccnt61001.2024.10724507

Publish Year: 2024