Literature DB >> 35991685

An Authentication-Based Secure Data Aggregation Method in Internet of Things.

Maryam Ataei Nezhad1, Hamid Barati1, Ali Barati1.   

Abstract

Internet of Things (IoT) means connecting different devices through the Internet. The Internet of things enables humans to remotely manage and control the objects they use with the Internet infrastructure. After the advent of the Internet of Things in homes, organizations, and private companies, privacy and information security are the biggest concern. This issue has challenged the spread of the Internet of things as news of the user's theft of information by hackers intensified. The proposed method in this paper consists of three phases. In the first phase, a star structure is constructed within each cluster, and a unique key is shared between each child and parent to encrypt and secure subsequent communications. The second phase is for intra-cluster communications, in which members of the cluster send their data to the cluster head in a multi-hop manner. Also, in this phase, the data is encrypted with different keys in each hop, and at the end of each connection, the keys are updated to ensure data security. The third phase is to improve the security of inter-cluster communications using an authentication protocol. In this way, the cluster heads are authenticated before sending information to prevent malicious nodes in the network. The proposed method is also simulated using NS2 software. The results showed that the proposed method has improved in terms of energy consumption, end-to-end delay, flexibility, packet delivery rate, and the number of alive nodes compared to other methods.
© The Author(s), under exclusive licence to Springer Nature B.V. 2022, Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Entities:  

Keywords:  Authentication; Elliptic curve cryptography; Internet of things; Rail fence cipher; Secure routing; Security

Year:  2022        PMID: 35991685      PMCID: PMC9376892          DOI: 10.1007/s10723-022-09619-w

Source DB:  PubMed          Journal:  J Grid Comput        ISSN: 1570-7873            Impact factor:   4.674


  2 in total

1.  Zone-Based Routing Protocol for Wireless Sensor Networks.

Authors:  Muni Venkateswarlu Kumaramangalam; Kandasamy Adiyapatham; Chandrasekaran Kandasamy
Journal:  Int Sch Res Notices       Date:  2014-11-18

2.  SDN-IoT empowered intelligent framework for industry 4.0 applications during COVID-19 pandemic.

Authors:  Anichur Rahman; Chinmay Chakraborty; Adnan Anwar; Md Razaul Karim; Md Jahidul Islam; Dipanjali Kundu; Ziaur Rahman; Shahab S Band
Journal:  Cluster Comput       Date:  2021-07-29       Impact factor: 2.303

  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.