FAN: Framework for Authentication of Nodes in Mobile Adhoc Environment of Internet-of-Things

被引:0
作者
Anil, G. N. [1 ]
机构
[1] BMSIT, Dept Comp Sci & Engn, Bengaluru, India
来源
SOFTWARE ENGINEERING AND ALGORITHMS IN INTELLIGENT SYSTEMS | 2019年 / 763卷
关键词
Internet-of-Things; Mobile adhoc network; Security; Access control; Secure permission; Ubiquitous; SECURITY; IOT; ATTACK; EDGE;
D O I
10.1007/978-3-319-91186-1_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Mobile Adhoc Network (MANET) has undergone significant improvement in the form of routing capabilities but still it lacks security potentials owing to its dynamic topology problems. Adoption of MANET in ubiquitous environment e.g. Internet-of-Things (IoT) could significant increase the communication capability but it could introduce significant level of threats too at same time. Therefore, the proposed manuscript introduces a Framework for Authentication (FAN) of mobile nodes where the technique first offers light-weight ciphering technique to initial stage of node communication followed by providing a significant access permission to authorized mobile nodes only to participate in data dissemination process. This analytical technique is also proven to offer communication efficiency apart from security against major potential threats on IoT environment.
引用
收藏
页码:56 / 65
页数:10
相关论文
共 32 条
  • [1] Data Fusion and IoT for Smart Ubiquitous Environments: A Survey
    Alam, Furqan
    Mehmood, Rashid
    Katib, Iyad
    Albogami, Nasser N.
    Albeshri, Aiiad
    [J]. IEEE ACCESS, 2017, 5 : 9533 - 9554
  • [2] Challenges and Opportunities of Waste Management in IoT-Enabled Smart Cities: A Survey
    Anagnostopoulos, Theodoros
    Zaslavsky, Arkady
    Kolomvatsos, Kostas
    Medvedev, Alexey
    Amirian, Pouria
    Morley, Jeremy
    Hadjieftymiades, Stathes
    [J]. IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2017, 2 (03): : 275 - 289
  • [3] [Anonymous], INT J COMPUT SCI ISS
  • [4] [Anonymous], IEEE T EMERG TOP COM
  • [5] [Anonymous], INT J COMPUT SCI ISS
  • [6] [Anonymous], 2015, Proc. Intl. Conf. Pervasive Comput. (ICPC)
  • [7] Chauvenet C, 2017, 2017 IEEE INTERNATIONAL SYMPOSIUM ON POWER LINE COMMUNICATIONS AND ITS APPLICATIONS (ISPLC)
  • [8] Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach
    Chen, Juntao
    Zhu, Quanyan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2736 - 2750
  • [9] Deogirikar J, 2017, 2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), P32, DOI 10.1109/I-SMAC.2017.8058363
  • [10] Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey
    Govindan, Kannan
    Mohapatra, Prasant
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02): : 279 - 298