Internet-of-Things (IoT) offers a big boon towards a massive network of connected devices and is considered to offer coverage to an exponential number of the smart appliance in the very near future. Owing to the nascent stage of evolution of IoT, it is shrouded by security loopholes because of various reasons. Review of existing research-based solution highlights the usage of conventional cryptographic-based solution over the traditional mechanism of data forwarding process between IoT nodes and gateway. The proposed system presents a novel solution to this problem by a model that is capable of performing a highly secured and cost-effective authentication process. The proposed system introduces Authentication Using Signature (AUS) as well as Security with Complexity Reduction (SCR) for the purpose to resist participation of any form of unknown threats.The outcome of the model shows better security strength with faster response time and energy saving of the IoT nodes.
Ad hoc wireless networks, particularly MANET, has gained widespread attention in the scientific community because of its widespread acceptance in everyday and real-life applications. However, MANET's routing performance is still hampered by decentralized communication patterns and dynamic route building between different types of mobile nodes, where infrastructure support is ineffective. Despite many research and advances in MANET technology, routing algorithms are still inefficient in terms of maximizing energy efficiency, maintaining robust security, and ensuring service quality (QoS). As a result, if energy consumption is higher and the security protocol is not robust, MANET's communication process and related components may be harmed. Any type of network flaw can lead to a slew of vulnerabilities and welcome a variety of invasions and attacks that can confuse routing processes and persuade nodes to agree to exhaust their complete energy. As a result, an effective mechanism is necessary.
In this paper we propose a mechanism to develop a lightweight encryption technique. We encrypt hierarchical single key-lock access control mechanism key by encoding key (key number). Key number is derived using Chinese reminder theorem and tribes of Gaussian or rational Farey fractions are used to encode the key number. The advantages of the proposed mechanism are i) no decoding overhead as access rights are derived without decoding the encoded the key number, ii) no need to derive the key number for already existing files. Hence this method secures access control system by encoding the key number and acts as a thin layer of security; however the performance of retrieval system remains unchanged.
General TermsAccess control mechanism, Cryptography, Network Security.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.