Bi-level authentication and mannequin routing for improving security features of WSN-IoT
Annotation
Node authentication and key management are the two significant security services employed in Wireless Sensor Networks (WSN). Since the growth of the devices in WSN is rapidly increasing, strong security policies should be employed to save the network from outside invaders. There is a wide range of smart applications developed in various fields such as military, health, agriculture, smart city, and many others. Since most of the applications consist of sensitive data, they should be protected to save the users’ privacy. Conventional protocols are more prone to security attacks and therefore the authors propose a secure and reliable protocol named Polynomial Authentication and Mapping Verification based Mannequin Routing (PAMVMR). This scheme involves two main processes such as Bi-level authentication and Information Processing. Bi-level authentication includes node-to-gateway authentication using polynomial key shares and node-to-node verification using mapping function that is processed through a context free grammar. Information processing includes creation of mannequin routes by applying Pascal’s triangle method and transmission of data. This makes the network more secure and reliable for data transmission from sensor nodes to a gateway node and from a gateway to users.
Keywords
Постоянный URL
Articles in current issue
- A fiber optic vibration sensor based on SMF-MMF-SMF structure and a tilted fiber Bragg grating
- Aberration analysis of a wedge as a compensator element in augmented and virtual reality systems.
- Estimation of temperature detection delay in a fiber optic gyroscope sensing coil.
- The relative intensity noise of a vertical-cavity surface-emitting laser with a fiber Bragg grating external cavity
- A comparative analysis of the frequency spectra of the human eye and a cut diamond in visible light
- Vulnerabilities in the quantum key distribution system induced under a pulsed laser attack
- Proactive management of the composition and structure of the spatial monitoring system under the influence of destabilizing factors
- An algorithm of trajectory control for the movement of a mobile robot without measuring the position coordinates
- Different III-V semiconductor nanowires with quantum dots on silicon: growth by molecular-beam epitaxy and properties
- Impact of magnesium oxide concentration and yttrium-aluminum garnet stoichiometry deviation on the microstructure and optical transmission of YAG-based ceramics
- Measurements of heat capacity and thermal conductivity of β-Ga2O3 and β-(AlxGa1–x)2O3 bulk crystals grown by the Czochralski method
- An approach to the identification of the state of elements in cyber-physical systems based on principal component analysis
- Stochastic software testing for vulnerability analysis
- Research of machine learning methods in the problem of identification of blood cells
- An Enhanced Exploration and Exploitation of Modified Grey Wolf Optimizer for Fuzzy Rules Reduction in Cloud Intrusion Detection System (CIDS)
- Model of information interaction channel routing on the FANET network using fuzzy logic
- Spline-wavelet bent robust codes
- Social media user identity linkage by graphic content comparison
- Monte Carlo Concrete DropPath for epistemic uncertainty estimation in pollen images classification
- Random number generation with arrays of coupled quantum-dot micropillar lasers
- The method of forming and using a digital passport for an electronic product at enterprises of the instrument-making industry
- Methods for determining the phase difference of the output signals for the receiving elements of a phased antenna array in a radiophoton circuit with parallel and series pairwise connection ...
- Routing in networks of autonomous underwater vehicles