K. Baskar, P. Vijayalakshmi, K. Muthumanickam, A. Arthi
{"title":"为了提高无线传感器网络的性能,提出了一种新的认证和访问调度方案","authors":"K. Baskar, P. Vijayalakshmi, K. Muthumanickam, A. Arthi","doi":"10.14311/nnw.2023.33.013","DOIUrl":null,"url":null,"abstract":"Wireless sensor network (WSN) is a kind of network specifically suitable for place where infrastructure and resources are playing a vital role. Moreover, nodes in a WSN are autonomous in nature. WSNs can be able to solve various real-time problems and issues like smart healthcare, smart office, smart energy, smart home, etc. As energy becomes one of the scarce supplies for this kind of network, attacks against authentication help to validate the legitimacy of sensor nodes become foremost important. Such attacks exhaust the power of nodes that are currently connected to a WSN, thereby reducing their lifetime. In this article, a zonal node authentication technique as well as optimal data access scheduling that renders data deliverance with improved quality of service and network lifetime is proposed. The results obtained from simulation for diverse WSN topologies accentuate the claim of our method over the existing solutions and demonstrate to be efficient in discovering legitimate sensor nodes with the optimal workload. Besides improved network lifetime, efficiency, and throughput, the proposed method also reinforces the security measures of the WSN by integrating node authentication.","PeriodicalId":49765,"journal":{"name":"Neural Network World","volume":"12 1","pages":"0"},"PeriodicalIF":0.7000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A novel authentication and access scheduling scheme to improve the performance of WSN\",\"authors\":\"K. Baskar, P. Vijayalakshmi, K. Muthumanickam, A. Arthi\",\"doi\":\"10.14311/nnw.2023.33.013\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor network (WSN) is a kind of network specifically suitable for place where infrastructure and resources are playing a vital role. Moreover, nodes in a WSN are autonomous in nature. WSNs can be able to solve various real-time problems and issues like smart healthcare, smart office, smart energy, smart home, etc. As energy becomes one of the scarce supplies for this kind of network, attacks against authentication help to validate the legitimacy of sensor nodes become foremost important. Such attacks exhaust the power of nodes that are currently connected to a WSN, thereby reducing their lifetime. In this article, a zonal node authentication technique as well as optimal data access scheduling that renders data deliverance with improved quality of service and network lifetime is proposed. The results obtained from simulation for diverse WSN topologies accentuate the claim of our method over the existing solutions and demonstrate to be efficient in discovering legitimate sensor nodes with the optimal workload. Besides improved network lifetime, efficiency, and throughput, the proposed method also reinforces the security measures of the WSN by integrating node authentication.\",\"PeriodicalId\":49765,\"journal\":{\"name\":\"Neural Network World\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.7000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Neural Network World\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14311/nnw.2023.33.013\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Neural Network World","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14311/nnw.2023.33.013","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
A novel authentication and access scheduling scheme to improve the performance of WSN
Wireless sensor network (WSN) is a kind of network specifically suitable for place where infrastructure and resources are playing a vital role. Moreover, nodes in a WSN are autonomous in nature. WSNs can be able to solve various real-time problems and issues like smart healthcare, smart office, smart energy, smart home, etc. As energy becomes one of the scarce supplies for this kind of network, attacks against authentication help to validate the legitimacy of sensor nodes become foremost important. Such attacks exhaust the power of nodes that are currently connected to a WSN, thereby reducing their lifetime. In this article, a zonal node authentication technique as well as optimal data access scheduling that renders data deliverance with improved quality of service and network lifetime is proposed. The results obtained from simulation for diverse WSN topologies accentuate the claim of our method over the existing solutions and demonstrate to be efficient in discovering legitimate sensor nodes with the optimal workload. Besides improved network lifetime, efficiency, and throughput, the proposed method also reinforces the security measures of the WSN by integrating node authentication.
期刊介绍:
Neural Network World is a bimonthly journal providing the latest developments in the field of informatics with attention mainly devoted to the problems of:
brain science,
theory and applications of neural networks (both artificial and natural),
fuzzy-neural systems,
methods and applications of evolutionary algorithms,
methods of parallel and mass-parallel computing,
problems of soft-computing,
methods of artificial intelligence.