Reference Hub2
Intelligent Authentication Model in a Hierarchical Wireless Sensor Network With Multiple Sinks

Intelligent Authentication Model in a Hierarchical Wireless Sensor Network With Multiple Sinks

Anusha Vangala, Sachi Pandey, Pritee Parwekar, Ikechi Augustine Ukaegbu
Copyright: © 2020 |Volume: 9 |Issue: 3 |Pages: 24
ISSN: 1947-928X|EISSN: 1947-9298|EISBN13: 9781799806677|DOI: 10.4018/IJNCR.2020070103
Cite Article Cite Article

MLA

Vangala, Anusha, et al. "Intelligent Authentication Model in a Hierarchical Wireless Sensor Network With Multiple Sinks." IJNCR vol.9, no.3 2020: pp.30-53. http://doi.org/10.4018/IJNCR.2020070103

APA

Vangala, A., Pandey, S., Parwekar, P., & Ukaegbu, I. A. (2020). Intelligent Authentication Model in a Hierarchical Wireless Sensor Network With Multiple Sinks. International Journal of Natural Computing Research (IJNCR), 9(3), 30-53. http://doi.org/10.4018/IJNCR.2020070103

Chicago

Vangala, Anusha, et al. "Intelligent Authentication Model in a Hierarchical Wireless Sensor Network With Multiple Sinks," International Journal of Natural Computing Research (IJNCR) 9, no.3: 30-53. http://doi.org/10.4018/IJNCR.2020070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A wireless sensor network consists of a number of sensors laid out in a field with mobile sinks dynamically aggregating data from the nodes. Sensitive applications such as military environment require the sink to identify if a sensor that it visits is legitimate, and in turn, the sensor has to ensure that the sink is authenticated to access its sensitive data. For the system to intelligently learn the credentials of non-malicious sink and non-malicious sensors based on the dynamically observed data, four approaches using access control lists, authenticator tokens, message digests, and elliptic curve variant of RSA algorithm are proposed along with the formal logic for correctness. The experimented data is analysed using false acceptance rate, false rejection rate, precision, and curve analysis parameters. The approaches are further compared based on the attacks they are vulnerable to and execution time, ultimately concluding that exchange of message digests and elliptic curve RSA algorithm are more widely applicable.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.