Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes
نویسندگان
چکیده
An ad-hoc sensor network (ASN) is a group of sensing nodes that transmit data over wireless link to target node, direct or indirect, through series nodes. ASN becomes high-risk for several security exploits due the node’s limited resources. Internal threats are more challenging protect against than external attacks. The grouped, and calculate each trust level. level result combining internal degrees. Cluster heads (CH) chosen based on anticipated levels. communications then digitally signed by source, encoded using key pair given trustworthy CH, decoded recipient, supervised verifications. It authenticates technique identifying presence both transmitter recipient. Our approach looks neighboring node meets threshold condition authenticate produced. companion reaffirms reliability getting public-key certification. seeking certification issuer must have close trusting relationship. results proposed hybrid authentication (HANT) system modeled tested, suggested outperforms conventional trust-based approaches in throughput, latency, lifetime, vulnerability methods.
منابع مشابه
Robust Assignments with Vulnerable Nodes
Various real-life planning problems require making upfront decisions before all parameters of the problem have been disclosed. An important special case of such problem especially arises in scheduling and staff rostering problems, where a set of tasks needs to be assigned to an available set of resources (personnel or machines), in a way that each task is assigned to one resource, while no task...
متن کاملA Hybrid Security Approach for Nodes Authentication in Wireless Sensor Network using Cellular Automata
We propose in this paper a computationally efficient security scheme for identifying network members in wireless sensor networks. The authentication process is done by first identifying the base station as being the authentic one with the use of fingerprinting information. Once the base station is authenticated, the others members of the network can then be authenticated by the base station. Th...
متن کاملTAaaS: Trustworthy Authentication as a Service
Authentication as a Service (AaaS) provides ondemand delivery of multi-factor authentication (MFA). However, current AaaS has left out of consideration the trustworthiness of user inputs at client devices and the risk of privacy exposure at the AaaS providers. To solve these concerns, we present TAaaS, Trustworthy Authentication as a Service, which offers a trusted path-based MFA service to the...
متن کاملTrustworthy Networks, Authentication, Privacy, and Security Models
Wireless networks are gaining popularity that comes with the occurrence of several networking technologies raising from personal to wide area, from centralized to distributed, and from infrastructure-based to infrastructure-less. Wireless data link characteristics such as openness of transmission media, makes these networks vulnerable to a novel set of security attacks, despite those that they ...
متن کاملAutomated Authentication Using Hybrid Biometric System
A highly reliable biometric authentication system can be realised by using multiple biometric models. In this study, a framework that makes use of signaland image-processing algorithms, together with pattern recognition techniques, is applied to solve the problem of biometric pattern recognition in a unified way. In general, this problem can be broken down into the following taxonomy: sensors, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer systems science and engineering
سال: 2023
ISSN: ['0267-6192']
DOI: https://doi.org/10.32604/csse.2023.030444