ISSN 2394-5125
 

Research Article 


TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS

K. Kavitha, G. Suseendran.

Abstract
In IoT environments, sensor nodes often need to transfer a massive quantity of identified data to the doorway in a petite duration. Therefore the door needs to usually validate the collaborating strategies in every period. But traditional security methods which involve cryptographic operations and privacy protections are not applicable in IoT networks, due to their resource constraints. Hence we propose to design trust-based data protection and authentication technique for IoT-WSN. In this technique, the behavioral trust and data trust values of each device are estimated by the data aggregator. Then, a total trust value is derived for each device using both types of these trust values. During data aggregation, the aggregator omits the data from the tools, whose trust values are low. To protect the data and perform authentication, a ticket-based message authentication code (MAC) is applied by the IoT sender. Simulation results show that the proposed technique involves a higher delivery ratio with reduced energy consumption.

Key words: Internet of Things (IoT), Sensor networks, Authentication, Message Authentication Code (MAC), Trust, Aggregator


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by K. Kavitha
Articles by G. Suseendran
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

K. Kavitha, G. Suseendran. TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS. JCR. 2020; 7(7): 707-711. doi:10.31838/jcr.07.07.129


Web Style

K. Kavitha, G. Suseendran. TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS. http://www.jcreview.com/?mno=107681 [Access: May 17, 2020]. doi:10.31838/jcr.07.07.129


AMA (American Medical Association) Style

K. Kavitha, G. Suseendran. TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS. JCR. 2020; 7(7): 707-711. doi:10.31838/jcr.07.07.129



Vancouver/ICMJE Style

K. Kavitha, G. Suseendran. TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS. JCR. (2020), [cited May 17, 2020]; 7(7): 707-711. doi:10.31838/jcr.07.07.129



Harvard Style

K. Kavitha, G. Suseendran (2020) TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS. JCR, 7 (7), 707-711. doi:10.31838/jcr.07.07.129



Turabian Style

K. Kavitha, G. Suseendran. 2020. TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS. Journal of Critical Reviews, 7 (7), 707-711. doi:10.31838/jcr.07.07.129



Chicago Style

K. Kavitha, G. Suseendran. "TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS." Journal of Critical Reviews 7 (2020), 707-711. doi:10.31838/jcr.07.07.129



MLA (The Modern Language Association) Style

K. Kavitha, G. Suseendran. "TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS." Journal of Critical Reviews 7.7 (2020), 707-711. Print. doi:10.31838/jcr.07.07.129



APA (American Psychological Association) Style

K. Kavitha, G. Suseendran (2020) TRUST-BASED DATA PROTECTION AND AUTHENTICATION TECHNIQUE FOR IOT-SENSOR NETWORKS. Journal of Critical Reviews, 7 (7), 707-711. doi:10.31838/jcr.07.07.129





Most Viewed Articles
  • ANALYTICAL RESULTS OF SLOPE FAILURE AND EFFECTIVE USE OF FLYCAM DATA: A CASE STUDY FROM KM 11 TO KM 13 ON THE 3B HIGHWAY, BACKAN PROVINCE OF VIETNAM
    VIETHA NGUYEN, HONGTHINH PHI, TRUONGTHANH PHI*
    JCR. 2020; 7(1): 1-5
    » Abstract » doi: 10.22159/jcr.07.01.01

  • ZOOTHERAPY AMONG THE ETHNIC GROUPS OF NORTH EASTERN REGION OF INDIA-A CRITICAL REVIEW
    KHIROD SANKAR DAS, SUDIPTA CHOUDHURY, K. CHANREILA L. NONGLAIT
    JCR. 2017; 4(2): 1-9
    » Abstract » doi: 10.22159/jcr.2017v4i2.14698

  • CADMIUM NANOPARTICLES AND ITS TOXICITY
    RAJNISH GUPTA
    JCR. 2019; 6(5): 1-7
    » Abstract » doi: 10.22159/jcr.2019v6i5.34073

  • RECENT THERAPEUTIC PROGRESS OF CHALCONE SCAFFOLD BEARING COMPOUNDS AS PROSPECTIVE ANTI-GOUT CANDIDATES
    DEBARSHI KAR MAHAPATRA, VIVEK ASATI, SANJAY KUMAR BHARTI
    JCR. 2019; 6(1): 1-5
    » Abstract » doi: 10.22159/jcr.2019v6i1.31760

  • ADVANCES OF HYDRAZONE LINKER IN POLYMERIC DRUG DELIVERY
    SHIVSHANKAR R. MANE
    JCR. 2019; 6(2): 1-4
    » Abstract » doi: 10.22159/jcr.2019v6i2.31833

  • Most Downloaded
  • CADMIUM NANOPARTICLES AND ITS TOXICITY
    RAJNISH GUPTA
    JCR. 2019; 6(5): 1-7
    » Abstract » doi: 10.22159/jcr.2019v6i5.34073

  • Multi Drug Resistance in Cancer Therapy-An Overview
    HARISH KADKOL, VIKAS JAIN, AMIT B PATIL*
    JCR. 2019; 6(6): 1-6
    » Abstract » doi: 10.22159/jcr.2019v6i6.35673

  • AN OVERVIEW ON MEDICINAL PLANTS FOR THE TREATMENT OF ACNE
    D. MANOGNA REDDY, VIKAS JAIN
    JCR. 2019; 6(6): 7-14
    » Abstract » doi: 10.22159/jcr.2019v6i6.35696

  • QUANTITATIVE ANALYSIS OF BIOLOGICAL NITROGEN FIXATION IN VARIOUS MODELS OF LEGUMES AND THE FACTORS INFLUENCING THE PROCESS: A REVIEW
    SAMEER SHARMA, ANIKET MALAGE, SIBI G.
    JCR. 2019; 6(6): 24-28
    » Abstract » doi: 10.22159/jcr.2019v6i6.35637

  • ANALYTICAL RESULTS OF SLOPE FAILURE AND EFFECTIVE USE OF FLYCAM DATA: A CASE STUDY FROM KM 11 TO KM 13 ON THE 3B HIGHWAY, BACKAN PROVINCE OF VIETNAM
    VIETHA NGUYEN, HONGTHINH PHI, TRUONGTHANH PHI*
    JCR. 2020; 7(1): 1-5
    » Abstract » doi: 10.22159/jcr.07.01.01

  • Most Cited Articles
  • ZOOTHERAPY AMONG THE ETHNIC GROUPS OF NORTH EASTERN REGION OF INDIA-A CRITICAL REVIEW
    KHIROD SANKAR DAS, SUDIPTA CHOUDHURY, K. CHANREILA L. NONGLAIT
    JCR. 2017; 4(2): 1-9
    » Abstract » doi: 10.22159/jcr.2017v4i2.14698
    Cited : 1 time [Click to see citing article]