SECURE AUTHENTICATION IN IoT BASED WSNs FOR DATA PRIVACY PROTECTION
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.7, No. 4)Publication Date: 2018-04-30
Authors : Poonam Gupta Anupama Gupta; Baldip Kaur;
Page : 604-614
Keywords : Authentication; Peer to peer security; Complex key; Mutual Authentication.;
Abstract
The security of IOT raises the major concerns as the IOTs are equipped with the limited resources based sensor nodes. Hence, these sensors must be provided with the light and efficient security algorithm for the enforcement of data privacy and user integrity in the given network. The two major security paradigms for IOTs are authentication & encryption mechanisms, which have many variants. In this thesis, the work has been carried over the enhancement of the proposed security model by designing the authentication model with set of algebraic equations. The multi-column based complex key generation is designed around the algebraic equations, specifically cubic and quartic equations. The authentication keys and data encryption is another security paradigm of the proposed model, which utilizes the advanced encryption standard (AES), which has been used for the implementation of the high security protocols. The performance of the proposed model has been analyzed under the different scenarios with variable number of nodes (50, 100 and 150) with decreasing transmission range of 75, 50 and 25 respectively. The proposed model has been recorded with minimum projected resource readings at 1.09, 5.49 and 10.96 percent in the scenarios with 50, 100 and 150 nodes respectively, whereas the maximum readings are 1.95, 9.81 and 19.63 percent for similar scenarios.
Other Latest Articles
- SYSTEM CONTROLLING USING A WEB CAMERA BASED ON COLOUR DETECTION USING HAND GESTURE RECOGNITION
- AUTOMATIC CAR SPEED CONTROL WITH WIRELESS RF CONTROL
- A NOVEL APPROACH ON ELECTROMAGNETIC SUSPENSION SYSTEM
- REAL TIME HUMAN FACE DETECTION IN SURVILLANCE SECURITY SYSTEM
- AUTOMATIC FACE DETECTION USING VIOLA-JONES FOR SECURITY PURPOSE
Last modified: 2018-04-28 20:45:03