期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Secure Localization Based Authentication (SLA) Strategy for Data Integrity in WNS 被引量:1
1
作者 V.Manikandan M.Sivaram +2 位作者 Amin Salih Mohammed V.Porkodi K.Shankar 《Computers, Materials & Continua》 SCIE EI 2021年第6期4005-4018,共14页
Wireless Sensor Networks(WSN)has been extensively utilized as a communication model in Internet of Things(IoT).As well,to offer service,numerous IoT based applications need effective transmission over unstable locatio... Wireless Sensor Networks(WSN)has been extensively utilized as a communication model in Internet of Things(IoT).As well,to offer service,numerous IoT based applications need effective transmission over unstable locations.To ensure reliability,prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs.Moreover,these models are affected by crucial denial of service(DoS)attacks,where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs.Here,secure localization based authentication(SLA)is presented to fight against DoS attack,and to fulfil the need of reliability and authentication.By examining state information,SLA projects a trust model to enhance efficacy of data delivery.Indeed,of the prevailing opportunistic protocols,SLA guarantees data integrity by modelling a trust based authentication,providing protection against DoS attackers and diminishing computational costs.Specifically,this model acts as a verification strategy to accelerate?attackers and to handle isolation.This strategy helps SLA in eliminating duplicate transmission and by continuous verification that results from conventional opportunistic routing.Simulation is performed in a MATLAB environment that offers authentic and reliable delivery by consuming approximately 50%of the cost in contrast to other approaches.The anticipated model shows better trade off in comparison to the prevailing ones. 展开更多
关键词 Wireless sensor networks opportunistic routing secure localization based authentication denial of service computational cost
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部