A trust-based authentication framework for security of WPAN using network slicing

نویسندگان

چکیده

New technologies bring along many challenges including security and privacy. Wireless personal area networks (WPANs) are characterized by limited energy resources computing power that calls for lightweight mechanisms in these as a mandatory requirement. In this paper, trust-based framework node authentication WPAN is proposed. Our main objective to minimise the effort distinguishing valid requests of trustworthy nodes from invalid malicious can result network compromises. We achieve through slicing which divides into virtually primary secondary networks. The proposed has three-fold benefits. First, it authenticates nodes’ based on novel method trust value calculation. Second, maintains efficiency while authenticating access resources. Finally, provides solution biasing problem arise due unexpected behaviour users WPANs. efficacy illustrated case study shown how accurately capture relations among preventing behavior.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

A security authentication method based on trust evaluation in VANETs

Vehicular ad hoc networks (VANETs) have a high degree of openness. Therefore, if a new vehicle node wants to access the network, we need to validate the vehicle node carefully to ensure the security of the entire networking. There are a large number of vehicle nodes, and the strange degree among the nodes is very high in VANETs. In addition, VANETs are human-oriented networks. All vehicle nodes...

متن کامل

Trust Oriented Security Framework for Ad Hoc Network

An ad hoc network is a group of wireless mobile hosts that are connected momentarily through wireless connections in the dearth of any centralized control or some supporting services. The mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and node level. The conventional security mechanisms deals with only protecting resources from unauthorized access,...

متن کامل

network of phonological rules in lori dialect of andimeshk: a study within the framework of post-generative approach.

پژوهش حاضر ارائه ی توصیفی است از نظام آوایی گویش لری شهر اندیمشک، واقع در شمال غربی استان خوزستان. چهارچوب نظری این پژوهش، انگاره ی پسازایشی جزءمستقل می باشد. این پایان نامه شامل موارد زیر است: -توصیف آواهای این گویش به صورت آواشناسی سنتی و در قالب مختصه های زایشی ممیز، همراه با آوانوشته ی تفصیلی؛ -توصیف نظام آوایی گویش لری و قواعد واجی آن در چهارچوب انگاره ی پسازایشی جزءمستقل و معرفی برهم کن...

Multi-Authentication for Cloud Security: A Framework

Cloud computing is a multi-tenant computational paradigm that offers an efficient, elastic and scalable business model for organizations to adopt various information technology (IT) resources i.e. software, hardware, network, storage, bandwidth etc. There are various aspects of security problem in cloud computing field which include data security, privacy and users’ authenticity. The purpose of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Electrical and Computer Engineering

سال: 2021

ISSN: ['2088-8708']

DOI: https://doi.org/10.11591/ijece.v11i2.pp1375-1387