A NOVEL AUTHENTICATION AND ACCESS SCHEDULING SCHEME TO IMPROVE THE PERFORMANCE OF WSN

被引:0
|
作者
Baskar, K. [1 ]
Vijayalakshmi, P. [2 ]
Muthumanickam, K. [3 ]
Arthi, A. [4 ]
机构
[1] Kongunadu Coll Engn & Technol, Dept Artificial Intelligence & Data Sci, Tholurpatti, Tamil Nadu, India
[2] Knowledge Inst Technol, Dept Comp Sci & Engn, Salem, Tamil Nadu, India
[3] Kongunadu Coll Engn & Technol, Dept Informat Technol, Tholurpatti, Tamil Nadu, India
[4] Rajalakshmi Inst Technol, Dept Artificial Intelligence & Data Sci, Chennai, Tamil Nadu, India
关键词
authentication; access scheduling; performance; security; WSN; WIRELESS SENSOR NETWORKS; 2-FACTOR USER AUTHENTICATION; SECURE; DELAY;
D O I
10.14311/NNW.2023.33.013
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless sensor network (WSN) is a kind of network specifically suit-able for place where infrastructure and resources are playing a vital role. Moreover, nodes in a WSN are autonomous in nature. WSNs can be able to solve various real-time problems and issues like smart healthcare, smart office, smart energy, smart home, etc. As energy becomes one of the scarce supplies for this kind of network, attacks against authentication help to validate the legitimacy of sensor nodes become foremost important. Such attacks exhaust the power of nodes that are currently connected to a WSN, thereby reducing their lifetime. In this article, a zonal node authentication technique as well as optimal data access scheduling that renders data deliverance with improved quality of service and network lifetime is proposed. The results obtained from simulation for diverse WSN topologies accen-tuate the claim of our method over the existing solutions and demonstrate to be efficient in discovering legitimate sensor nodes with the optimal workload. Besides improved network lifetime, efficiency, and throughput, the proposed method also reinforces the security measures of the WSN by integrating node authentication.
引用
收藏
页码:205 / 224
页数:20
相关论文
共 50 条
  • [1] A Novel Authentication Scheme against node captured attack in WSN for healthcare scene
    Yang, Sheng-Kai
    Shiue, Ya-Ming
    Su, Zhi-Yuan
    Liu, Chuan-Gang
    PROCEEDINGS OF 2019 IEEE EURASIA CONFERENCE ON BIOMEDICAL ENGINEERING, HEALTHCARE AND SUSTAINABILITY (IEEE ECBIOS 2019), 2019, : 39 - 42
  • [2] AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment
    Nashwan, Shadi
    EGYPTIAN INFORMATICS JOURNAL, 2021, 22 (01) : 15 - 26
  • [3] Accelerated vBNN-IBS Authentication Scheme for WSN
    Qin, Danyang
    Zhang, Yan
    Ma, Jingya
    Yang, Songxiang
    Wang, Erfu
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 290 - 297
  • [4] An Authentication Information Exchange Scheme in WSN for IoT Applications
    Yang, Sheng-Kai
    Shiue, Ya-Ming
    Su, Zhi-Yuan
    Liu, I-Hsien
    Liu, Chuan-Gang
    IEEE ACCESS, 2020, 8 : 9728 - 9738
  • [5] A Novel Digital Certificate Based Remote Data Access Control Scheme in WSN
    Liang, Wei
    Ruan, Zhiqiang
    Zhou, Hongbo
    Xie, Yong
    JOURNAL OF SENSORS, 2015, 2015
  • [6] A novel user authentication and access control scheme for a distributed computer network
    Lee, WB
    Liao, KC
    Hsiao, YH
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS: CONTROL, COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 118 - 122
  • [7] A New Lightweight User Authentication and Key Agreement Scheme for WSN
    Foroozan Ghosairi Darbandeh
    Masoumeh Safkhani
    Wireless Personal Communications, 2020, 114 : 3247 - 3269
  • [8] A New Lightweight User Authentication and Key Agreement Scheme for WSN
    Darbandeh, Foroozan Ghosairi
    Safkhani, Masoumeh
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (04) : 3247 - 3269
  • [9] Medium Access Scheme with Power Control to Improve Performance of FlashLinQ
    Kim, Jun Suk
    Gu, Jaheon
    Yoon, Hee-Woong
    Chung, Min Young
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2014, PT IV, 2014, 8582 : 696 - 708
  • [10] WSN node access authentication protocol based on trusted computing
    Liu, Jing
    Liu, Lihui
    Liu, Zenghui
    Lai, Yingxu
    Qin, Hua
    Luo, Shiyao
    SIMULATION MODELLING PRACTICE AND THEORY, 2022, 117