
تعداد نشریات | 21 |
تعداد شمارهها | 610 |
تعداد مقالات | 9,026 |
تعداد مشاهده مقاله | 67,082,740 |
تعداد دریافت فایل اصل مقاله | 7,656,160 |
Spatio temporal based distributed message and source location security protocol to wireless sensor network-polynomial based scheme | ||
International Journal of Nonlinear Analysis and Applications | ||
مقاله 166، دوره 14، شماره 1، فروردین 2023، صفحه 2111-2121 اصل مقاله (577.64 K) | ||
نوع مقاله: Research Paper | ||
شناسه دیجیتال (DOI): 10.22075/ijnaa.2022.6785 | ||
نویسندگان | ||
Parthasaradhi Mayasala* 1؛ S. Murali Krishna* 2 | ||
1SVCE, JNTUA Anantapuramu, India | ||
2SV College of Engineering, Tirupati, India | ||
تاریخ دریافت: 26 آذر 1400، تاریخ بازنگری: 29 اردیبهشت 1401، تاریخ پذیرش: 13 خرداد 1401 | ||
چکیده | ||
Message and node authentication is one among the foremost effective ways to prevent nodes from being propagated, forwarded, and corrupted, unauthorized messages over wireless sensor networks (WSNs). In order to alleviate those challenges, several message authentication schemes based on symmetric or public key cryptosystems have been developed. Despite various benefits, many challenges still exist in the attack mitigating in the wireless sensor network such as considering the reputation of a source and updating it dynamically by considering node transmission characteristics on packet data with the source and intermediate node acts neighbour. In addition, most of them have the constants of communication overhead, high computations, resilience and scalability. To address these issues, a novel polynomial-based scheme has been developed and it has been named Spatial Temporal based Distributed Message and Source Security Authentication Protocol. However, this scheme address all the weakness of built-in threshold-based schemes employed for message authentication in determining the degree of the polynomial. The puzzle-based node authentication has been enabled for intermediate nodes; the proposed scheme allows unlimited message transmission by any node without the struggling problem of the threshold. | ||
کلیدواژهها | ||
Source Location Privacy؛ Hop by Hop Encryption؛ Wireless Sensor Network؛ Energy Efficient Technique؛ Channel Allocation and Migration؛ Energy Conservation؛ Bandwidth Efficiency | ||
مراجع | ||
[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, Wireless sensor networks: A survey, J. Comput. Networks 38 (2002), no. 4, 393–422. | ||
آمار تعداد مشاهده مقاله: 17,113 تعداد دریافت فایل اصل مقاله: 248 |