A NOVEL AUTHENTICATION AND ACCESS SCHEDULING SCHEME TO IMPROVE THE PERFORMANCE OF WSN

被引:0
|
作者
Baskar, K. [1 ]
Vijayalakshmi, P. [2 ]
Muthumanickam, K. [3 ]
Arthi, A. [4 ]
机构
[1] Kongunadu Coll Engn & Technol, Dept Artificial Intelligence & Data Sci, Tholurpatti, Tamil Nadu, India
[2] Knowledge Inst Technol, Dept Comp Sci & Engn, Salem, Tamil Nadu, India
[3] Kongunadu Coll Engn & Technol, Dept Informat Technol, Tholurpatti, Tamil Nadu, India
[4] Rajalakshmi Inst Technol, Dept Artificial Intelligence & Data Sci, Chennai, Tamil Nadu, India
关键词
authentication; access scheduling; performance; security; WSN; WIRELESS SENSOR NETWORKS; 2-FACTOR USER AUTHENTICATION; SECURE; DELAY;
D O I
10.14311/NNW.2023.33.013
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless sensor network (WSN) is a kind of network specifically suit-able for place where infrastructure and resources are playing a vital role. Moreover, nodes in a WSN are autonomous in nature. WSNs can be able to solve various real-time problems and issues like smart healthcare, smart office, smart energy, smart home, etc. As energy becomes one of the scarce supplies for this kind of network, attacks against authentication help to validate the legitimacy of sensor nodes become foremost important. Such attacks exhaust the power of nodes that are currently connected to a WSN, thereby reducing their lifetime. In this article, a zonal node authentication technique as well as optimal data access scheduling that renders data deliverance with improved quality of service and network lifetime is proposed. The results obtained from simulation for diverse WSN topologies accen-tuate the claim of our method over the existing solutions and demonstrate to be efficient in discovering legitimate sensor nodes with the optimal workload. Besides improved network lifetime, efficiency, and throughput, the proposed method also reinforces the security measures of the WSN by integrating node authentication.
引用
收藏
页码:205 / 224
页数:20
相关论文
共 50 条
  • [31] A Novel Secure Authentication Scheme for VANETs
    Tiwari, Dinesh
    Bhushan, Mayank
    Yadav, Ankit
    Jain, Suman
    2016 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2016, : 287 - 297
  • [32] A novel cascading scheme to improve the performance of voltage multiplier circuits
    Chouhan, Shailesh Singh
    Halonen, Kari
    ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING, 2015, 84 (03) : 373 - 381
  • [33] A novel cascading scheme to improve the performance of voltage multiplier circuits
    Shailesh Singh Chouhan
    Kari Halonen
    Analog Integrated Circuits and Signal Processing, 2015, 84 : 373 - 381
  • [34] Identity Based Authentication Scheme (IAS) for Securing WSN Based Internet of Things
    Khan, Zubair Ahmed
    Ambhaikar, Asha
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (02) : 1364 - 1375
  • [35] Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments
    Li, Chun-Ta
    Hwang, Min-Shiang
    Chu, Yen-Ping
    COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4255 - 4258
  • [36] A Simple Authentication Scheme and Access Control Protocol for VANETs
    Wu, Wei-Chen
    Chen, Yi-Ming
    UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 259 - 272
  • [37] A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN
    Cui, Zhihua
    Xue, Fei
    Zhang, Shiqiang
    Cai, Xingjuan
    Cao, Yang
    Zhang, Wensheng
    Chen, Jinjun
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (02) : 241 - 251
  • [38] Improving the Authentication Scheme and Access Control Protocol for VANETs
    Wu, Wei-Chen
    Chen, Yi-Ming
    ENTROPY, 2014, 16 (11) : 6152 - 6165
  • [39] Trusted Network Access Authentication Scheme Based on the Label
    Wang, Yu
    Duan, Yu
    Wang, Fei
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 123 - 130
  • [40] A Blockchain Based Access Authentication Scheme of Energy Internet
    Chen, Xiaolian
    Hu, Xiao
    Li, Yang
    Gao, Xue
    Li, Dawei
    2018 2ND IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2018,