Mid Square Hash Bezier Secured Routing for IoT Enabled Wireless Sensor Networks

R. Mohanraj
{"title":"Mid Square Hash Bezier Secured Routing for IoT Enabled Wireless Sensor Networks","authors":"R. Mohanraj","doi":"10.37421/INT","DOIUrl":null,"url":null,"abstract":"The swift uptake of sensors and the increasing demand of Wireless Sensor Network (WSN) applications and services create unmatched appeals for routing data packets on WSN infrastructure. In the era of Internet of Things (IoT), an immense number of sensing devices collect numerous sensor data over time for an extensive span of fields. For IoT-enabled devices routing through WSN, sensor nodes transmit confidential data to the gateway nodes via public channels. In such an environment, secured routing remains a serious issue that has to be addressed. To address this issue, in this work, a robust method using Mid Square Hash-based Bezier Authentication (MSH-BA) is designed to secure the routing for IoT-enabled WSNs. First, a Mid Square Hashing Data Collection algorithm is proposed to minimize the energy consumption through unique key generation. To minimize the running time of IoT sensor network, discrete registration is performed between user and gateway nodes. Finally, the proof of correctness of mutual authentication is performed using the Bezier Authentication method via progressive distance, therefore ensuring packet delivery ratio. The robust authentication method is analyzed comprehensively and compared against the similar authentication methods and the results showed that it is efficient and robust than earlier methods.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"9 1","pages":"1-7"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of sensor networks and data communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37421/INT","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The swift uptake of sensors and the increasing demand of Wireless Sensor Network (WSN) applications and services create unmatched appeals for routing data packets on WSN infrastructure. In the era of Internet of Things (IoT), an immense number of sensing devices collect numerous sensor data over time for an extensive span of fields. For IoT-enabled devices routing through WSN, sensor nodes transmit confidential data to the gateway nodes via public channels. In such an environment, secured routing remains a serious issue that has to be addressed. To address this issue, in this work, a robust method using Mid Square Hash-based Bezier Authentication (MSH-BA) is designed to secure the routing for IoT-enabled WSNs. First, a Mid Square Hashing Data Collection algorithm is proposed to minimize the energy consumption through unique key generation. To minimize the running time of IoT sensor network, discrete registration is performed between user and gateway nodes. Finally, the proof of correctness of mutual authentication is performed using the Bezier Authentication method via progressive distance, therefore ensuring packet delivery ratio. The robust authentication method is analyzed comprehensively and compared against the similar authentication methods and the results showed that it is efficient and robust than earlier methods.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网无线传感器网络的中方散列贝塞尔安全路由
传感器的迅速普及以及无线传感器网络(WSN)应用和服务需求的不断增长,为在WSN基础设施上路由数据包创造了无与伦比的需求。在物联网(IoT)时代,大量的传感设备随着时间的推移在广泛的领域收集大量的传感器数据。对于通过WSN路由的物联网设备,传感器节点通过公共通道将机密数据传输到网关节点。在这样的环境中,安全路由仍然是一个必须解决的严重问题。为了解决这个问题,在这项工作中,设计了一种使用基于中间方哈希的贝塞尔认证(MSH-BA)的鲁棒方法来保护支持物联网的wsn的路由。首先,提出了一种中方散列数据收集算法,通过生成唯一密钥来最小化能量消耗。为了最大限度地减少物联网传感器网络的运行时间,在用户和网关节点之间进行离散注册。最后,采用递进距离的Bezier认证方法对相互认证的正确性进行证明,从而保证了报文的发送率。对该鲁棒认证方法进行了综合分析,并与同类认证方法进行了比较,结果表明该方法具有较早的鲁棒性和有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Program Operators SIT, tS, S1 e, Set1 Towards Ultraviolet Microbeam Scanning and Lens-Less UV Microbeam Microscopy with Mirror Galvanometric Scanners: From the History of Research Instrumentation to Engineering of Modern Mechatronic Optical Systems Smart Surveillance: A Review & Survey Through Deep Learning Techniques for Detection & Analysis Deep Surveillance System Federated Learning for Collaborative Network Security in Decentralized Environments
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1