
International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 7 Issue 2
March-April 2025
Indexing Partners



















A Novel Distributed Mac Security Implementation in Switching Networks Using BMP-MACSEC and BP-SKEIN
Author(s) | Amaresan Venkatesan |
---|---|
Country | USA |
Abstract | Distributed MAC security is implemented in SN to collectively protect the data at the MAC layer. However, the existing studies didn’t concentrate on the MAC address flooding attacks and MAC table overflow in SN. Therefore, this paper presents distributed MAC security implementation in SN using BMP-MACSEC and BP-Skein. Primarily, users register in the network; afterward, data transmission is initiated. Blockchain-based MAC address maintenance is created for each port by using the BP-Skein. Then, switches are clustered by employing DB-DBSCAN. Next, data is transmitted through the clustered switches. At this point, the MAC address details of the transmitted data are hashed and verified. If both MACs are matched, then the data is transmitted to the corresponding port. Next, MAC security is done by employing BMP-MACSEC. Then, the obtained symmetric key is split and reconstructed by employing NI-SSS. Likewise, the split key with the data packet is subjected to IDS for attack detection. If attacked, then the access is denied; otherwise, key verification is done. If verified, then the data is accessed; otherwise, it is blocked. The results proved that the proposed model achieved a high-security level of 98.68%, thus outperforming the prevailing techniques. |
Field | Engineering |
Published In | Volume 3, Issue 6, November-December 2021 |
Published On | 2021-12-23 |
DOI | https://doi.org/10.36948/ijfmr.2021.v03i06.1816 |
Short DOI | https://doi.org/g8nhjb |
Share this

E-ISSN 2582-2160

CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
