Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Energy Efficient Trust Aware Secured Lightweight Authentication Protocol for Efficient Reprogramming in Internet of Things

View through CrossRef
Abstract Internet of Things (IoT) is the collection of physical things that consist of integrated technologies to interact, sense and collaborate in the deployed environment. Data dissemination is a network management service that is provided to nodes of IoT, where the base station monitors and manages the device related configuration parameter queries and commands in the network. It is very much essential to identify the legitimate nodes which are required for reprogramming and reconfiguring for device configuration during data transmission in order to ensure the security and reliability of the network. Since a greater number of devices are being reprogrammed to exchange data and commands autonomously in IoT, providing security to the disseminated configuration parameters is very important. Therefore, a strong security authentication mechanism is requiring to prevent the various types of attacks against data dissemination. An energy efficient trust based secured lightweight authentication protocol is introduced to suggest better authenticated and secure data dissemination to the devices of IoT. The proposed protocol provides effective clustering and discovers optimal route by selecting the only trusted nodes during data dissemination process. The proposed protocol provides effective clustering and discovers optimal route by selecting the only trusted nodes during data dissemination process. The benefits of the presented system are it improves the security during data dissemination and optimizes the energy by detecting the relevant sensor nodes which are interested in data dissemination. The proposed system is executed in NS3 simulation. The simulation results provide better authentication with optimised energy consumption during the data dissemination in the proposed protocol.
Springer Science and Business Media LLC
Title: Energy Efficient Trust Aware Secured Lightweight Authentication Protocol for Efficient Reprogramming in Internet of Things
Description:
Abstract Internet of Things (IoT) is the collection of physical things that consist of integrated technologies to interact, sense and collaborate in the deployed environment.
Data dissemination is a network management service that is provided to nodes of IoT, where the base station monitors and manages the device related configuration parameter queries and commands in the network.
It is very much essential to identify the legitimate nodes which are required for reprogramming and reconfiguring for device configuration during data transmission in order to ensure the security and reliability of the network.
Since a greater number of devices are being reprogrammed to exchange data and commands autonomously in IoT, providing security to the disseminated configuration parameters is very important.
Therefore, a strong security authentication mechanism is requiring to prevent the various types of attacks against data dissemination.
An energy efficient trust based secured lightweight authentication protocol is introduced to suggest better authenticated and secure data dissemination to the devices of IoT.
The proposed protocol provides effective clustering and discovers optimal route by selecting the only trusted nodes during data dissemination process.
The proposed protocol provides effective clustering and discovers optimal route by selecting the only trusted nodes during data dissemination process.
The benefits of the presented system are it improves the security during data dissemination and optimizes the energy by detecting the relevant sensor nodes which are interested in data dissemination.
The proposed system is executed in NS3 simulation.
The simulation results provide better authentication with optimised energy consumption during the data dissemination in the proposed protocol.

Related Results

An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Autonomy on Trial
Autonomy on Trial
Photo by CHUTTERSNAP on Unsplash Abstract This paper critically examines how US bioethics and health law conceptualize patient autonomy, contrasting the rights-based, individualist...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Banking system trust, bank trust, and bank loyalty
Banking system trust, bank trust, and bank loyalty
Purpose The purpose of this paper is to test a model of banking system trust as an antecedent of bank trust and bank loyalty. Six determinants of trust and loyalty are included: co...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Measuring trust in supply chain partners' relationships
Measuring trust in supply chain partners' relationships
PurposeThe purpose of this paper is to develop a context dependent, multi perspective multilevel trust measurement instrument to measure supply chain members' trust.Design/methodol...
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
The security of Quantum Secure Direct Communication (QSDC) and its authentication procedure based on multiple stages is analyzed. The security analysis shows that the process of au...

Back to Top