A Research on Securing Lightweight Data Interchange in Ad-hoc Networks: A Comparative Study of XML and JSON Vulnerabilities

Authors

  • Ramavat Kamal Narendra Assistant Professor, Department of Computer Science, Shree Swaminarayan Gurukul College of Information Technology Porbandar, Gujarat, India
  • Tushar Jakhaniya Assistant Professor, Faculty of Engineering & Technology, Parul Institute of Technology, Parul University, Vadodara, Gujarat, India
  • Nirav Pareshkumar Mehta Assistant Professor, Faculty of Engineering & Technology, Parul Institute of Technology, Parul University, Vadodara, Gujarat, India

DOI:

https://doi.org/10.46610/JAHNMC.2025.v02i02.004

Keywords:

Ad-hoc networks, Denial-Of-Service (DoS), Internet of Things (IoT), Lightweight Secure Interchange Layer (LSIL), XML

Abstract

The rapid adoption of ad-hoc networks in mobile and distributed systems has amplified the demand for secure, efficient, and lightweight data interchange formats. Among the most widely used standards, XML (eXtensible Markup Language) and JSON (JavaScript Object Notation) remain essential for structured communication across heterogeneous and resource-constrained devices. Despite their popularity, both formats are vulnerable to a variety of security threats, including injection attacks, Denial-Of-Service (DoS), and data tampering, which can severely compromise system integrity and availability. This research presents a comparative analysis of XML and JSON security vulnerabilities in ad-hoc network environments, systematically identifying common attack vectors and assessing their impact on network performance. To address these challenges, a novel hybrid validation and encryption framework, termed the Lightweight Secure Interchange Layer (LSIL), is proposed. LSIL combines schema validation, anomaly detection, and lightweight cryptographic techniques to enhance data protection without imposing significant computational overhead. Experimental evaluation demonstrates that LSIL achieves over 90% attack detection accuracy while maintaining low latency, making it highly suitable for real-time, resource-limited mobile and ad-hoc network applications.

References

I. Ceintav and M. Tahir Sandikkaya, “A Review of Lightweight IoT Authentication Protocols from the Perspective of Security Requirements, Computation, Communication, and Hardware Costs,” IEEE Access, vol. 13, pp. 37703–37723, 2025, doi: https://doi.org/10.1109/access.2025.3546147.

A. Z. A. Aljarwan and M. A. Bin Ngadi, “Review of Certificateless Authentication Scheme for Vehicular Ad Hoc Networks,” IEEE Access, vol. 13, pp. 100074–100094, 2025, doi: https://doi.org/10.1109/access.2025.3576926.

W. El-Shafai, A. K. Mesrega, Ahmed, N. A. Elbahnasawy, and Fathi, “Hybrid lightweight encryption for IoT: integrating chaotic key generators with Feistel and substitution-permutation networks for secure 3DV transmission,” Multimedia Tools and Applications, Mar. 2025, doi: https://doi.org/10.1007/s11042-024-19203-x.

Y. Khalifa et al., “Enhancing Vehicular Ad-hoc Networks (VANETs) Security: A Comprehensive Analysis of Emerging Threats and Countermeasures,” 2024 12th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC), pp. 129–134, Dec. 2024, doi: https://doi.org/10.1109/jac-ecc64419.2024.11061233.

X. Chen, “A security integration model for private data of intelligent mobile communication based on edge computing,” Computer Communications, vol. 162, pp. 204–211, Oct. 2020, doi: https://doi.org/10.1016/j.comcom.2020.08.026.

S. Holm and M. Hammoudeh, “A Comparative Analysis of IoT Protocols for Resource Constraint Devices and Networks,” ICFNDS ’22: Proceedings of the 6th International Conference on Future Networks & Distributed Systems, Dec. 2022, doi: https://doi.org/10.1145/3584202.3584295.

S. Aluvala, K. R. Sekhar, and D. Vodnala, “An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks,” Procedia Computer Science, vol. 92, pp. 554–561, 2016, doi: https://doi.org/10.1016/j.procs.2016.07.382.

S. N. Mahapatra, B. K. Singh, and V. Kumar, “A secure multi-hop relay node selection scheme-based data transmission in wireless ad-hoc network via block chain,” Multimedia Tools and Applications, vol. 81, no. 13, pp. 18343–18373, Mar. 2022, doi: https://doi.org/10.1007/s11042-022-12283-7.

G. Said, A. Ghani, A. Ullah, M. Azeem, M. Bilal, and K. S. Kwak, “Light-Weight Secure Aggregated Data Sharing in IoT-Enabled Wireless Sensor Networks,” IEEE Access, vol. 10, pp. 33571–33585, Jan. 2022, doi: https://doi.org/10.1109/access.2022.3160231.

M. Sirajuddin, Ch. Rupa, S. Bhatia, R. N. Thakur, and A. Mashat, “Hybrid Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Network-Based E-Healthcare System,” Wireless Communications and Mobile Computing, vol. 2022, pp. 1–8, Jun. 2022, doi: https://doi.org/10.1155/2022/9134036.

Published

2025-08-21