ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SECURE AUTHENTICATION IN IoT BASED WSNs FOR DATA PRIVACY PROTECTION

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.7, No. 4)

Publication Date:

Authors : ; ;

Page : 604-614

Keywords : Authentication; Peer to peer security; Complex key; Mutual Authentication.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The security of IOT raises the major concerns as the IOTs are equipped with the limited resources based sensor nodes. Hence, these sensors must be provided with the light and efficient security algorithm for the enforcement of data privacy and user integrity in the given network. The two major security paradigms for IOTs are authentication & encryption mechanisms, which have many variants. In this thesis, the work has been carried over the enhancement of the proposed security model by designing the authentication model with set of algebraic equations. The multi-column based complex key generation is designed around the algebraic equations, specifically cubic and quartic equations. The authentication keys and data encryption is another security paradigm of the proposed model, which utilizes the advanced encryption standard (AES), which has been used for the implementation of the high security protocols. The performance of the proposed model has been analyzed under the different scenarios with variable number of nodes (50, 100 and 150) with decreasing transmission range of 75, 50 and 25 respectively. The proposed model has been recorded with minimum projected resource readings at 1.09, 5.49 and 10.96 percent in the scenarios with 50, 100 and 150 nodes respectively, whereas the maximum readings are 1.95, 9.81 and 19.63 percent for similar scenarios.

Last modified: 2018-04-28 20:45:03