Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Energy Efficient Trust Aware Secured Lightweight Authentication Protocol for Efficient Reprogramming in Internet of Things

View through CrossRef
Abstract Internet of Things (IoT) is the collection of physical things that consist of integrated technologies to interact, sense and collaborate in the deployed environment. Data dissemination is a network management service that is provided to nodes of IoT, where the base station monitors and manages the device related configuration parameter queries and commands in the network. It is very much essential to identify the legitimate nodes which are required for reprogramming and reconfiguring for device configuration during data transmission in order to ensure the security and reliability of the network. Since a greater number of devices are being reprogrammed to exchange data and commands autonomously in IoT, providing security to the disseminated configuration parameters is very important. Therefore, a strong security authentication mechanism is requiring to prevent the various types of attacks against data dissemination. An energy efficient trust based secured lightweight authentication protocol is introduced to suggest better authenticated and secure data dissemination to the devices of IoT. The proposed protocol provides effective clustering and discovers optimal route by selecting the only trusted nodes during data dissemination process. The proposed protocol provides effective clustering and discovers optimal route by selecting the only trusted nodes during data dissemination process. The benefits of the presented system are it improves the security during data dissemination and optimizes the energy by detecting the relevant sensor nodes which are interested in data dissemination. The proposed system is executed in NS3 simulation. The simulation results provide better authentication with optimised energy consumption during the data dissemination in the proposed protocol.
Springer Science and Business Media LLC
Title: Energy Efficient Trust Aware Secured Lightweight Authentication Protocol for Efficient Reprogramming in Internet of Things
Description:
Abstract Internet of Things (IoT) is the collection of physical things that consist of integrated technologies to interact, sense and collaborate in the deployed environment.
Data dissemination is a network management service that is provided to nodes of IoT, where the base station monitors and manages the device related configuration parameter queries and commands in the network.
It is very much essential to identify the legitimate nodes which are required for reprogramming and reconfiguring for device configuration during data transmission in order to ensure the security and reliability of the network.
Since a greater number of devices are being reprogrammed to exchange data and commands autonomously in IoT, providing security to the disseminated configuration parameters is very important.
Therefore, a strong security authentication mechanism is requiring to prevent the various types of attacks against data dissemination.
An energy efficient trust based secured lightweight authentication protocol is introduced to suggest better authenticated and secure data dissemination to the devices of IoT.
The proposed protocol provides effective clustering and discovers optimal route by selecting the only trusted nodes during data dissemination process.
The proposed protocol provides effective clustering and discovers optimal route by selecting the only trusted nodes during data dissemination process.
The benefits of the presented system are it improves the security during data dissemination and optimizes the energy by detecting the relevant sensor nodes which are interested in data dissemination.
The proposed system is executed in NS3 simulation.
The simulation results provide better authentication with optimised energy consumption during the data dissemination in the proposed protocol.

Related Results

An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Autonomy on Trial
Autonomy on Trial
Photo by CHUTTERSNAP on Unsplash Abstract This paper critically examines how US bioethics and health law conceptualize patient autonomy, contrasting the rights-based, individualist...
Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks
Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks
Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. The security aspect of IoT networks is critical, especially the a...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Banking system trust, bank trust, and bank loyalty
Banking system trust, bank trust, and bank loyalty
Purpose The purpose of this paper is to test a model of banking system trust as an antecedent of bank trust and bank loyalty. Six determinants of trust and loya...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively ...
Tox4 modulates cell fate reprogramming
Tox4 modulates cell fate reprogramming
ABSTRACT Reprogramming to induced pluripotency induces the switch of somatic cell identity to induced pluripotent stem cells (iPSCs). However, the mediators and mech...

Back to Top