ISSN 2394-5125
 

Research Article 


TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS

K. Kavitha, G. Suseendran.

Abstract
In IoT environments, sensor nodes often need to transfer a massive quantity of identified data to the doorway in a petite duration. Therefore the door needs to usually validate the collaborating strategies in every period. But traditional security methods which involve cryptographic operations and privacy protections are not applicable in IoT networks, due to their resource constraints. Hence we propose to design trust-based data protection and authentication technique for IoT-WSN. In this technique, the behavioral trust and data trust values of each device are estimated by the data aggregator. Then, a total trust value is derived for each device using both types of these trust values. During data aggregation, the aggregator omits the data from the tools, whose trust values are low. To protect the data and perform authentication, a ticket-based message authentication code (MAC) is applied by the IoT sender. Simulation results show that the proposed technique involves a higher delivery ratio with reduced energy consumption.

Key words: Internet of Things (IoT), Sensor networks, Authentication, Message Authentication Code (MAC), Trust, Aggregator


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by K. Kavitha
Articles by G. Suseendran
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

K. Kavitha, G. Suseendran. TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS. JCR. 2020; 7(7): 707-711. doi:10.31838/jcr.07.07.129


Web Style

K. Kavitha, G. Suseendran. TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS. http://www.jcreview.com/?mno=107681 [Access: September 15, 2020]. doi:10.31838/jcr.07.07.129


AMA (American Medical Association) Style

K. Kavitha, G. Suseendran. TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS. JCR. 2020; 7(7): 707-711. doi:10.31838/jcr.07.07.129



Vancouver/ICMJE Style

K. Kavitha, G. Suseendran. TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS. JCR. (2020), [cited September 15, 2020]; 7(7): 707-711. doi:10.31838/jcr.07.07.129



Harvard Style

K. Kavitha, G. Suseendran (2020) TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS. JCR, 7 (7), 707-711. doi:10.31838/jcr.07.07.129



Turabian Style

K. Kavitha, G. Suseendran. 2020. TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS. Journal of Critical Reviews, 7 (7), 707-711. doi:10.31838/jcr.07.07.129



Chicago Style

K. Kavitha, G. Suseendran. "TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS." Journal of Critical Reviews 7 (2020), 707-711. doi:10.31838/jcr.07.07.129



MLA (The Modern Language Association) Style

K. Kavitha, G. Suseendran. "TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS." Journal of Critical Reviews 7.7 (2020), 707-711. Print. doi:10.31838/jcr.07.07.129



APA (American Psychological Association) Style

K. Kavitha, G. Suseendran (2020) TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS. Journal of Critical Reviews, 7 (7), 707-711. doi:10.31838/jcr.07.07.129