Enhancing Network Security and Efficiency in Smart Cities: SDN-Based Hashing Authentication

In contemporary society, technological devices have seamlessly integrated into our daily routines, becoming indispensable components that optimize time and energy consumption. Among these technologies, Artificial Intelligence (AI) and the Internet of Things (IoT) have revolutionized various aspects of life, elevating speed, convenience, and efficiency. However, this reliance on technology has brought forth security concerns that permeate every sector, impacting the network as a whole. This study proposes a solution employing a hashing mechanism for authentication using SHA-256 and implementing the SDN controller for streamlined network operations and detection of potential threats. To address this issue, the development of a comprehensive system capable of authenticating nodes, effectively routing data packets, monitoring network behavior, and detecting malicious nodes is imperative. This is to examine critical aspects necessary to achieve a robust and secure network infrastructure. This results in effective and efficient detection, routing and maintainability of the network while keeping the throughput low avoiding delay in performance and adaptive to most situations.


INTRODUCTION
In the present era, there exists a vast multitude of internetconnected gadgets that possess the capacity to engage in communication, facilitate the sharing of valuable information, and contribute to the generation of meaningful insights.This information not only provides advantages to the network in which it is present, but it also significantly benefits the users by facilitating their daily lives.Recent study suggests that there is a growing trend in the proliferation of gadgets, with projections indicating that the number of devices in the UK alone might reach 31.7 million by 2030 [1].The number of gadgets in the world is substantial, particularly when considering the global population.Moreover, there is an exponential growth trend observed in the proliferation of these devices.Therefore, the implementation of an improved communication protocol would enhance inter-device communication and expedite data transmission in comparison to both legacy and current networks [2].However, in light of these circumstances, it is imperative to prioritise the initial line of defence by allocating meticulous attention to it.This approach will facilitate the establishment of a robust network of interconnected entities, hence enabling seamless information sharing.This will confer advantages onto individuals in their ability to make informed and efficient judgements.This technique has the potential to be implemented across various sectors, including but not limited to smart cities, autos, industry, health, food, and the environment.The suggested method aims to leverage device authenticity, network infrastructure, and speed mechanisms to address the challenges at hand.By utilising these factors, we anticipate improvements in device novelty, disaster recovery, and overall management.

Background
Prior studies [3] have examined the approach of enhancing defense systems, although despite their many attributes, they still exhibit Allegedly, under such circumstances, there exists the potential for a catastrophic outcome, posing a significant threat to humanity.The potential consequences include severe economic downturn, significant infrastructural damage, and challenges for law enforcement agencies in monitoring individuals' actions.There is a potential for military weapons to experience instability.The reliability of medical operations may become compromised, leading individuals to develop apprehension and erode their trust in Advanced Technologies.The presence of such a significant degree of unreliability can lead to malfunctions and devastation.If this trend persists, it is conceivable that artificial intelligence (AI) may eventually assume control over the planet, but in a detrimental manner.

Focus
In order to address all cases comprehensively, it is imperative to incorporate innovative technologies that may significantly enhance the security aspect of smart gadgets, hence establishing a secure and conducive environment for habitation.To achieve this objective, it is possible to consider the existence of a network comprised of various devices.These devices would utilise their unique capabilities, such as the implementation of Mac address hashing features.Additionally, a centrally managed system would be employed to exclusively permit the operation of authenticated devices within the network.Consequently, solely devices that have undergone authentication would be able to access and utilise the internet within this network.This can be advantageous as the presence of novelty implies that the network is comprised solely of authentic devices.However, the execution of this phenomena necessitates the involvement of researchers.Through their diligent efforts, it is anticipated that a favourable consequence may be achieved, one that would be advantageous for the entirety of humanity.

SOFTWARE DEFINED NETWORKING
The concept of Software Defined Networking as explained in Figure 1 is commonly understood as the fundamental infrastructure that enables the monitoring of individual nodes within a network, facilitating the efficient detection and response to any atypical actions occurring inside said network [4].Furthermore, it has the capability to identify the underlying cause of network failure within the network itself, if such a failure occurs.Additionally, it possesses the capacity to identify any detrimental node that can be eradicated in order to mitigate network delays.Low latency networks are utilised to meet the demands of many requirements, and they possess significant capabilities in addressing concerns related to speed and reaction.The primary concern pertains to effectively mitigating any potential network disasters, making it crucial to identify and investigate the magnitude of such threats.

Characteristics
SDN offers a comprehensive set of characteristics [5] that effectively address the issues pertaining to the time.This technique is executed through the utilisation of its three-layer architecture: 1. Application Layer: The layer in question assumes the role of managing the communication channels between all nodes within the entirety of the network in the context of Software-Defined Networking (SDN).The utilisation of North Bound Interface (NBI) drivers facilitates the establishment of communication channels and the transmission of data to the Software-Defined Networking (SDN) controller.The initial phase of the detection process serves as a crucial layer via which all pertinent information is transmitted to the subsequent layer.
2. Control Layer: This layer is responsible for managing the traffic between nodes in a data network, with a focus on monitoring, 3. Infrastructure Layer: The efficient transmission of data is a crucial aspect inside a network, and this particular layer is responsible for managing this process.It encompasses several components such as sensor devices, routers, and switches, all of which operate using the open flow protocol.The encompassing layer of the SDN architecture is responsible for overseeing and optimising the overall performance of the system.
The aforementioned characteristics of Software-Defined Networking (SDN) are expected to comprehensively address both inbound and outbound activities occurring within a network.By effectively managing these activities, SDN has the potential to establish, sustain, and ultimately enhance the overall network capacity.Additionally, the implementation of SDN is anticipated to significantly minimise overhead and accurately regulate latency, even in challenging scenarios [6].The suggested model will employ these characteristics to optimise the utilisation of information inside a network.The future performance will be ensured to a significant extent, hence enhancing reliability.

HASHING AUTHENTICATION
Hashing authentication is a prevalent practise in the realm of Smart Cities, wherein each device is assigned a unique MAC address.These addresses possess an inherent quality of being unalterable, rendering them an effective means of ensuring device integrity [7].The aforementioned capability will assist us in the verification of devices, a critical aspect of any network.Without this process, it is impossible to ascertain if a device is legitimately connected to the network or not.Hence, it is vital to adhere to the prescribed methods in order to attain the intended functionality.
1.The initial step involves the registration of all authorised devices within the network.The registration procedure is limited to the two relevant nodes, and upon successful completion, they will be able to establish a connection with the network.
2. In the proposed system, when a node attempts to establish a connection with another node, it is required to authenticate its Media Access Control (MAC) address by comparing it with the previously transmitted data from the same device.This authentication process is carried out by the Cluster Head (CH) nodes located at the base station.
3. Following the successful verification of the device, it proceeds to traverse the network paths, taking into consideration both latency and responsiveness.The base station establishes a communication pathway for the nodes inside the network.The communication is maintained with end-to-end encryption.
Figure 2 illustrates the architectural design of the Hashing Authentication system, elucidating its operational processes as previously described.This measure will guarantee the complete absence of any malicious nodes attempting to establish connections with the network for the purpose of transmitting data.

PROPOSED COMBINATION ARCHITECTURE OF SDN AND HASHING AUTHENTICATION
The process of monitoring the quantity of gadgets in contemporary times has become increasingly intricate as a result of the extensive range available, particularly in light of the significant volume of data involved.The data, which will afterwards exert a significant influence on the future, is solely contingent upon the answers that can be proposed by individuals.The implementation of an autonomous system that encompasses a diverse range of features and intricate security methods can facilitate our integration over time.As we can see in Figure 3, the subsequent stage in the network is the authentication process, when all devices undergo rigorous security protocols to ensure their transparency and resilience inside the network [8].The individuals will continue to be subject to surveillance for any atypical behaviour, and the software-defined network (SDN) Figure 3: Proposed Architecture will excel in this regard.Instead of relying on manual troubleshooting, using digital measures enhances the system's performance and examine digital traces.This significantly impacts the efficiency in terms of time saved.The use of this solution is expected to yield significant time savings, as well as mitigate any delays in network tasks, so ultimately enhancing the overall performance.
Prior studies (Smith, 2010) have demonstrated the advantageous impact of the authentication mechanism on the identification of both fraudulent and valid nodes.This would facilitate advancements in the medical domain, particularly in treatments that necessitate the use of validated and authenticated instruments, such as surgeries, which may be executed with ease and exceptional accuracy.The concept of automobility entails ensuring that the vehicle's cognitive system is not exposed to any erroneous data that may lead to potentially catastrophic circumstances.The banking sector, being of significant economic importance, can only be accessed through authorised gateways that are strictly regulated for data access, modification, and manipulation.These kind of instances can also be applicable to other industries, where it is imperative to establish a strong digital presence [9,10].
The utilisation of Software-Defined Networking (SDN) for monitoring purposes can contribute to enhancing security measures by effectively identifying and mitigating potentially dangerous actions.Through intelligent management, SDN enables the filtering and control of devices involved in such activities.In order to address the network overhead, it is possible to decrease network latency, so ensuring that data transfer is adequately handled without overloading a minimal number of devices involved in traffic production [11].The integration of management and authentication systems enhances the overall intelligence of the system, enabling it to accommodate any potential connectivity of "things" to the internet.In light of its internet accessibility, it is important to ensure the security of the aforementioned entity.Consequently, this notion stands as the most promising advancement so far.
The presence of robust defence systems can enhance the profitability of organisations by enabling a greater emphasis on economic generation, while simultaneously ensuring the preservation of infrastructure.The enhancement of consumer reliability is expected to ultimately contribute to the realisation of a smart city concept [12].A smart city lacking these measures would be seen unsuccessful, hence discouraging individuals from adopting such a way of life [13].The demand for a safe system is very high in order to meet the pleasure of individuals.Social and technical experiments can be conducted to test the feasibility and potential of a suggested idea inside a controlled setting.Through these experiments, conclusions can be taken regarding the attainability of the idea and the extent to which it can be realized.

EVALUATION
In order to fulfil the aforementioned objective, experiments were undertaken to evaluate the suggested architecture and observe the network's behaviour.The architectural design is founded upon the integration of hashing authentication and a software-defined networking (SDN) controller as its underlying framework.Collectively, they have the responsibility for ensuring the authenticity of network devices, as well as controlling the flow of packet data.This involves the ability to identify and eliminate any fraudulent nodes that may negatively impact the overall performance of the network topology as illustrated in Figure 4.
SDN in this scenario is responsible to act as the controller and it creates a network path for the packets to be sent and that is because if the packets are sent to the false node, then rejection of that node will be faced and as a result, retention of that packet will occur.This results in the delay inside the network and throughput is caused.For that purpose, it verifies the source and the destination first and then it helps the node to secure communication within the best possible route.Suppose switch 2 is trying to send a packet to switch 9 and in between there exists a malicious node ready to create obstacles for them.So, accurate and precise detection is much beneficial in this scenario which helps boost up the network and reduce latency.Based on the conducted simulation tests, it is evident from the obtained findings that the prompt removal of transmission hindrances leads to a notable increase in the number of packets being delivered.Additionally, the average hop count for message transportation ranges between 2 and 4, indicating a highly efficient outcome.Here is the data analysis returned: 1.The term "count" refers to the numerical representation of the messages that have been transmitted to these nodes.
2. The term "mean" refers to the calculation of the average number of hops in a given route design.
As shown in Figure 5 that in terms of usability and security, it is evident that the network's throughput is minimised due to the utilisation of a low-resource consuming hashing technique.This mechanism outperforms resource-dependent algorithms and other authentication measures in terms of performance.Software-Defined Networking (SDN) facilitates enhanced allocation of data packet paths among nodes, resulting in a comprehensive enhancement of the entire network's performance, hence promoting network stability and reliability.

CONCLUSION
The suggested architectural framework incorporates the softwaredefined networking (SDN) network architecture in conjunction with the hashing authentication mechanism.This integration aims to enhance intelligence, facilitate decision-making in critical scenarios, optimise time management, and ensure continuous monitoring of device behaviour.The integrated architectural design will demonstrate resilience against significant risks, so enabling the effective use of these technologies and yielding predictable beneficial results.From a prospective standpoint, the widespread application of this concept is likely to yield significant advantages for individuals who recognise the need of establishing a secure foundation for their operations, as opposed to jeopardising their infrastructure investments.The expeditious attainment of a robust and significant outcome has the potential to disrupt the existing frameworks established by prior scholars.Therefore, it is imperative to accord the highest level of importance to this concept within the existing research landscape of Smart cities.

Figure 1 :
Figure 1: SDN Architecture with all its distinctive Features