gateway node
Recently Published Documents


TOTAL DOCUMENTS

72
(FIVE YEARS 26)

H-INDEX

6
(FIVE YEARS 2)

2021 ◽  
Vol 11 (6) ◽  
pp. 653-661
Author(s):  
Preetha Shivanna ◽  
Sheela Samudrala Venkatesiah

In the current era, it is necessary to device authorization and authentication techniques to secure resources in information technology. There are several methods to substantiate authorization and authentication. User authentication is essential for authenticating user access control in WSNs. Biometric recognition error, lack of anonymity and vulnerability to attacks, user verification problem, revocation problem and disclosure of session key by the gateway node are some of the security flaws encountered. In this study, a Multimodal Authentication Scheme for Wireless Sensor Networks (WSN-MAS) is proposed to authenticate legitimate users. The main objective is the fusion of fingerprint and iris biometric features at feature level to enable additional accuracy to verify and match user identity with stored templates. In this paper, multimodal biometric features are used for authentication to improve performance, reduce system error rates to achieve better security in WSN.


2021 ◽  
Vol 1 (1) ◽  
Author(s):  
Mariusz Wzorek ◽  
Cyrille Berger ◽  
Patrick Doherty

AbstractThe focus of this paper is on base functionalities required for UAV-based rapid deployment of an ad hoc communication infrastructure in the initial phases of rescue operations. The main idea is to use heterogeneous teams of UAVs to deploy communication kits that include routers, and are used in the generation of ad hoc Wireless Mesh Networks (WMN). Several fundamental problems are considered and algorithms are proposed to solve these problems. The Router Node Placement problem (RNP) and a generalization of it that takes into account additional constraints arising in actual field usage is considered first. The RNP problem tries to determine how to optimally place routers in a WMN. A new algorithm, the RRT-WMN algorithm, is proposed to solve this problem. It is based in part on a novel use of the Rapidly Exploring Random Trees (RRT) algorithm used in motion planning. A comparative empirical evaluation between the RRT-WMN algorithm and existing techniques such as the Covariance Matrix Adaptation Evolution Strategy (CMA-ES) and Particle Swarm Optimization (PSO), shows that the RRT-WMN algorithm has far better performance both in amount of time taken and regional coverage as the generalized RNP problem scales to realistic scenarios. The Gateway Node Placement Problem (GNP) tries to determine how to locate a minimal number of gateway nodes in a WMN backbone network while satisfying a number of Quality of Service (QoS) constraints.Two alternatives are proposed for solving the combined RNP-GNP problem. The first approach combines the RRT-WMN algorithm with a preexisting graph clustering algorithm. The second approach, WMNbyAreaDecomposition, proposes a novel divide-and-conquer algorithm that recursively partitions a target deployment area into a set of disjoint regions, thus creating a number of simpler RNP problems that are then solved concurrently. Both algorithms are evaluated on real-world GIS models of different size and complexity. WMNbyAreaDecomposition is shown to outperform existing algorithms using 73% to 92% fewer router nodes while at the same time satisfying all QoS requirements.


2021 ◽  
Vol 9 (1) ◽  
pp. 29-40
Author(s):  
Sharon Chan Suet Yan ◽  
Alice Tang Su Wei ◽  
Jie Hui Bong ◽  
Quor Ling Teh ◽  
Shanmugapiriya Sivalingam ◽  
...  

The Robust and Energy Efficient Authentication Protocol works for Industrial Internet of Things. The Internet of Things (IoT) is an arising innovation and expected to give answers for different modern fields. The IoT enable connection of physical devices all around the world to the internet by collecting and sharing critical and real-time data among each other. The increment of devices increases the computational cost during data transmission between devices and towards the internet. In this paper we proposed a solution that is a multi-factor authentication protocol to enhance the protocol proposed by Li et al. For Industrial IoT by adding One Time Password (OTP) after the biometric information of the user is checked by the Gateway Node (GWN) to be able to tackle additional network attack aside from those that are overcome by Li et al. scheme. Our contribution for this project is, we proposed the solution that a multi-factor authentication protocol to enhance the protocol proposed. For Industrial IoT by adding One Time Password (OTP) after the biometric information of the user is checked by the Gateway Node (GWN) to be able to tackle additional network attack aside from those that are overcome. The idea of adding OTP is inspired by where they scheme correlates to biometric of user as well. Our proposal is lower cost than the three protocols regarding authentication overhead and computational cost perspectives. Challenges and future directions of this paper examined the security shortcomings of a client confirmation convention for WSN, which is as proposed by Chang and Le. To address the normal security shortcomings of past protocols, we proposed a strong and energy effective three-factor authentication protocol for WSN.


2021 ◽  
pp. 1-14
Author(s):  
Wei Shu ◽  
Dajiang He ◽  
Jun Shu

In order to overcome the problems of low channel utilization, low transmission success rate and high data transmission delay in current gateway node reconfiguration methods of IOT, this paper proposes a novel gateway node reconfiguration method of IOT based on hierarchical coding particle swarm optimization. Based on the IOT network model, this paper analyzes the delay characteristics of the IOT, and constructs the object function of the gateway node reconfiguration of IOT. By monotone decreasing inertia weight strategy, the coding particle swarm optimization is optimized, and the reconfiguration objective function of the gateway node of IOT by using the optimized particle swarm optimization algorithm is solved. Experimental results show that the channel utilization ratio of the proposed method is higher than 90%, the success rate of information transmission is more than 80%, and the data transmission delay is less than 0.5 s, which indicates that the proposed method has high channel utilization, high transmission success rate and low data transmission delay.


2021 ◽  
Vol 8 (9) ◽  
pp. 117-124
Author(s):  
Kaiqiang Mai ◽  
◽  
Baoyuan Kang ◽  
Rui Li ◽  
◽  
...  

Recently, medical and healthcare associations have gradually begun to use the Internet of Things and wireless sensor networks to monitor, collect data, and use wireless body area networks (WBANs) to communicate with patients. However, due to the characteristics of wireless networks that can freely access data on public channels, WBANs face some problems in the security and privacy protection. At the same time, some authentication schemes for wireless body area networks have also been proposed. In this paper, we carefully analyze Fotouhi et al.’s authentication scheme for wireless body area networks in health-care IoT and find that Fotouhi et al.’s scheme is vulnerable to several weaknesses. The main shortcoming of Fotouhi et al.’s scheme is that it takes up too much storage space of each entity during the registration and authentication phase. To overcome the shortcomings of Fotouhi et al.’s scheme, we propose an improved scheme. In our improved scheme, each entity will store less data than Fotouhi et al.’s scheme in the registration phase. Furthermore, we make the gateway node store as little data as possible by adding some key information to the transmitted messages in the authentication phase of the improved scheme. These measures can greatly save a lot of storage space and improve efficiency. We also investigate the security of the improved scheme in informal analysis and formal analysis.


2021 ◽  
Author(s):  
Kabiru N. Aliyu ◽  
Saleh A. Alawsh ◽  
Ali H. Muqaibel ◽  
Suhail I. Al-Dharrab ◽  
Wessam Mesbah ◽  
...  

Abstract Oil and gas companies consider transforming conventional cable-based seismic acquisition to wireless acquisition as a promising step for cost and weight reduction in reservoir exploration. Wireless seismic acquisition requires large number of wireless geophone (WG) sensors to be deployed in the field. The locations of the WG sensors must be known when processing the collected data. The application of direction of arrival (DOA) estimation helps in localizing WGs and improves received signal level through beam steering and interference avoidance. Conventional DOA algorithms require high computational complexity which renders them inefficient for real-time response. In this paper, deep neural network (DNN) is proposed for DOA estimation of WGs at wireless gateway node (WGN) under different channel conditions. The estimated angle and corresponding coordinates of WGNs are used in least square estimation (LSE) to estimate the position of the WGs. The simulation results depict reasonable estimation and position accuracy in real-time.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Yue Wu ◽  
Liangtu Song ◽  
Lei Liu

This article introduces the new method of sensor data privacy protection method for IoT. Asymmetric encryption is used to verify the identity of the gateway by the sensor. The IoT gateway node verifies the integrity and source of the data, then creates a block, and submits the block chain transaction. In order to avoid tracking the source of the data, a ring signature is used to anonymize the gateway transaction. The proxy re-encryption method realizes the sharing of encrypted data. On the basis of smart contracts, attribute-based data access control allows decentralized applications to finely control data access. Through experiments, the effects of sensor/gateway verification, transaction signatures, and sensor data encryption on performance are discussed. The results show that transaction delays are all controlled within a reasonable range. The system performance achieved by this method is also relatively stable.


Author(s):  
Pawan ◽  
Susheela Hooda

Wireless ad-hoc networks have become the most vibrant and vital area of research over the past years. Most devices in MANET are power operated. Therefore, the need of the hour is to design a protocol that will not only saves the battery life but also increase the lifetime of participating nodes in the ad-hoc network. In this paper, a new power-aware routing protocol has been proposed which selects the best gateway node for sending the data packets from source to destination. Additionally, the proposed routing protocol extends the battery lifetime of a mobile node and also minimizes the power consumption of an entire network. Moreover, this paper also presents an experimental evaluation of the proposed routing protocol by using three parameters (remaining power path, remaining battery power, and hop count) and provide the best path.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1337
Author(s):  
Aliyu Dala ◽  
Tughrul Arslan

There is an increasing interest in water bodies, which make up more that seventy percent of our planet. It is thus imperative that the water environment should be remotely monitored. Radio frequency (RF) signals have higher bandwidth and lower latency compared to acoustic signals. However, water has high permittivity and conductivity which presents a challenge for the implementation of RF technology. In this work, we undertook a novel design, fabrication, measurement and implementation of an antenna for a sensor node with dual ability of underwater and water surface long range (LoRa) communication at 868 MHz. It was observed that the antenna’s performance deteriorated underwater without −10 dB effective bandwidth between 668 MHz and 1068 MHz. The introduction of an oil-impregnated paper buffer around the antenna resulted in an effective 400 MHz bandwidth within the same frequency span. The sensor node with the buffered antenna was able to achieve a distance of 6 m underwater and 160 m over water surface communication to a data gateway node. The sensor node without the buffered antenna was only able to achieve 80 m over water surface communication. These experimental results show the feasibility of using the LoRa 868 MHz frequency in underwater and water surface communication.


Author(s):  
Pooja Verma

Integration procedures are employed to increase and enhance computing networks and their application domain. Extensive studies towards the integration of MANET with the internet have been studied and worked towards addressing various challenges for such integration. Some idyllic mechanisms always fail due to the presence of some nasty node or other problems such as face alteration and eavesdropping. The focus of this chapter is on the design and discovery of secure gateway scheme in MANET employing trust-based security factors such as route trust and load ability. Over these, the elliptic curve cryptography is applied to achieve confidentiality, integrity, and authentication while selecting optimum gateway node that has less bandwidth, key storage space, and faster computational time. Simulation results of the security protocol through SPAN for AVISPA tool have shown encouraging results over two model checkers namely OFMC and CL-AtSe.


Sign in / Sign up

Export Citation Format

Share Document