PTAP: Pair Key Based Trust Authentication Protocol for Authentication in Wireless Sensor Network

2016 ◽  
Vol 13 (3) ◽  
pp. 1701-1708
Author(s):  
M Raghini ◽  
N. Uma Maheswari ◽  
R Venkatesh
2020 ◽  
Vol 8 (4) ◽  
pp. 253-265
Author(s):  
Prabu P ◽  
Senthilnathan T

PurposeIn wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user authentication must be focused.Design/methodology/approachIn previous works, for secured authentication, Enhanced User Authentication Protocol (EUAP) is presented. On the other hand, the user free password generation is permitted in the previous technique.FindingsHere, password leakage may cause a malevolent user's contribution to the WSN environment. By presenting the Flexible and Secured User Authentication Protocol (FSUAP), this is solved in the presented technique in which secured as well as reliable sharing of data contents via unsecured wireless sensor devices was accomplished.Originality/valueThe foremost objective of the present technique is to device the protocol that would verify the users beforehand letting them access the sensor devices situated in various sites. The use of a sensor device could be reduced in a significant way. Three-factor authentication protocols are presented in place of two-factor authentication protocol in the presented technique that could deal with and safeguard the environment from a brute force attack in an effective manner.


2018 ◽  
Vol 14 (9) ◽  
pp. 155014771879595 ◽  
Author(s):  
Hejie Chen ◽  
Chunxue Wu ◽  
Wending Huang ◽  
Yan Wu ◽  
Naixue Xiong

In the industrial Internet of Things, water and electricity is the most important hidden project. Its requirements are very high, especially the intelligent control of water and electricity. Therefore, a design and application of system with dual-control of water and electricity is proposed and convolutional neural networks–based video recognition technology is used to identify the security issues that occur in the field. Some sensors are used to control the use of water and electricity, while others are used to collect scalar data which include user’s data and video multimedia data in the wireless sensor network. The scalar data are used to update the user’s database, and the video multimedia data are used to monitor and prevent anomalies from occurring in the field of dual-control of water and electricity. In order to solve the security problem of the user in wireless sensor network, this article proposes a radio frequency identification mutual security authentication protocol based on shared secret hash function. Finally, experiments show that the proposed secure authentication protocol can guarantee the secure transmission of data between the sensor node and the server, and the video recognition technology can recognize some abnormalities well.


Sign in / Sign up

Export Citation Format

Share Document