Bi-level authentication and mannequin routing for improving security features of WSN-IoT
Journal: Scientific and Technical Journal of Information Technologies, Mechanics and Optics (Vol.21, No. 6)Publication Date: 2021-12-24
Authors : Sasirega L. Shanthi Ch.;
Page : 929-935
Keywords : Bi-level authentication; polynomial token; mapping variables; mannequin route; Pascal’s binomial triangle;
Abstract
Node authentication and key management are the two significant security services employed in Wireless Sensor Networks (WSN). Since the growth of the devices in WSN is rapidly increasing, strong security policies should be employed to save the network from outside invaders. There is a wide range of smart applications developed in various fields such as military, health, agriculture, smart city, and many others. Since most of the applications consist of sensitive data, they should be protected to save the users' privacy. Conventional protocols are more prone to security attacks and therefore the authors propose a secure and reliable protocol named Polynomial Authentication and Mapping Verification based Mannequin Routing (PAMVMR). This scheme involves two main processes such as Bi-level authentication and Information Processing. Bi-level authentication includes node-to-gateway authentication using polynomial key shares and node-to-node verification using mapping function that is processed through a context free grammar. Information processing includes creation of mannequin routes by applying Pascal's triangle method and transmission of data. This makes the network more secure and reliable for data transmission from sensor nodes to a gateway node and from a gateway to users.
Other Latest Articles
- Model of information interaction channel routing on the FANET network using fuzzy logic
- An Enhanced Exploration and Exploitation of Modified Grey Wolf Optimizer for Fuzzy Rules Reduction in Cloud Intrusion Detection System (CIDS)
- Research of machine learning methods in the problem of identification of blood cells
- Stochastic software testing for vulnerability analysis
- An approach to the identification of the state of elements in cyber-physical systems based on principal component analysis
Last modified: 2022-01-10 20:03:04