“…This work is an extension to the work done by Kumar et al [1] [2] Where cryptographic property, availability, is ensured for an RFID-WSN through outlier detection mechanism. Detection of unprecedented data identified from resource constraint mobile sensor devices is proposed.…”
Section: Introductionmentioning
confidence: 93%
“…Level of access rights help to measure the significance of data sharing and mechanism like fine-grained access control is developed to clarify the controls. Fine-grained access control mechanisms can be classified as attribute based techniques, Identity based techniques, and Role-based techniques [1] [2]. In [11], it is observed that formal methods play an important role to check the mistakes in defining the policies that may arise due to expressiveness property of policies.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In this work, outliers among passive nodes are identified using the anomaly score. Kumar et al [1] anomaly score calculation is modified as shown inequ.1 and equ. 2.…”
Section: Proposed Approach For Ensuring Availabilitymentioning
confidence: 99%
“…This paper is organized as follows. Section 2 gives details of the work done by earlier researchers and state-of-art in this area with rapid review of the work done by Kumar et al [1] [2]. Section 3 gives the detail about proposed approaches for ensuring availability, anomaly score error minimization and outlier detection.…”
Radio Frequency IDentification (RFID) and Wireless Sensor Networks (WSN) are the two most prominent wireless technologies for implementing a complete smart environment for the Internet of Things (IoT). Both RFID and WSN are resource constraint devices, which forces us to go for lightweight cryptography for security purposes. Security in terms of confidentiality, integrity, authentication, authorization, and availability. Key management is one of the major constraints for resource constraint mobile sensor devices. This work is an extension of the work done by Kumar et al. using efficient error prediction and limit of agreement for anomaly score. This work ensures cryptographic property, availability, in RFID-WSN integrated network through outlier detection mechanism for 50 to 5000 nodes network. Through detection ratios and anomaly scores system is tested against outliers. The proposed outlier detection mechanism identifies the inliers and outliers through anomaly score for protection against Denial-of-Service (DoS) attack. Intruders can be detected in few milliseconds without giving any conflict to the access rights. In terms of throughput, a minimum improvement of 6.2% and a maximum of 219.9% is observed for the proposed protocol as compared to Kumar et al. Protocol and in terms of percentage of Packet Delivery Ratio (PDR), a minimum improvement of 8.9% and a maximum of 19.5% is observed for the proposed protocol as compared to Kumar et al. protocol.
“…This work is an extension to the work done by Kumar et al [1] [2] Where cryptographic property, availability, is ensured for an RFID-WSN through outlier detection mechanism. Detection of unprecedented data identified from resource constraint mobile sensor devices is proposed.…”
Section: Introductionmentioning
confidence: 93%
“…Level of access rights help to measure the significance of data sharing and mechanism like fine-grained access control is developed to clarify the controls. Fine-grained access control mechanisms can be classified as attribute based techniques, Identity based techniques, and Role-based techniques [1] [2]. In [11], it is observed that formal methods play an important role to check the mistakes in defining the policies that may arise due to expressiveness property of policies.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In this work, outliers among passive nodes are identified using the anomaly score. Kumar et al [1] anomaly score calculation is modified as shown inequ.1 and equ. 2.…”
Section: Proposed Approach For Ensuring Availabilitymentioning
confidence: 99%
“…This paper is organized as follows. Section 2 gives details of the work done by earlier researchers and state-of-art in this area with rapid review of the work done by Kumar et al [1] [2]. Section 3 gives the detail about proposed approaches for ensuring availability, anomaly score error minimization and outlier detection.…”
Radio Frequency IDentification (RFID) and Wireless Sensor Networks (WSN) are the two most prominent wireless technologies for implementing a complete smart environment for the Internet of Things (IoT). Both RFID and WSN are resource constraint devices, which forces us to go for lightweight cryptography for security purposes. Security in terms of confidentiality, integrity, authentication, authorization, and availability. Key management is one of the major constraints for resource constraint mobile sensor devices. This work is an extension of the work done by Kumar et al. using efficient error prediction and limit of agreement for anomaly score. This work ensures cryptographic property, availability, in RFID-WSN integrated network through outlier detection mechanism for 50 to 5000 nodes network. Through detection ratios and anomaly scores system is tested against outliers. The proposed outlier detection mechanism identifies the inliers and outliers through anomaly score for protection against Denial-of-Service (DoS) attack. Intruders can be detected in few milliseconds without giving any conflict to the access rights. In terms of throughput, a minimum improvement of 6.2% and a maximum of 219.9% is observed for the proposed protocol as compared to Kumar et al. Protocol and in terms of percentage of Packet Delivery Ratio (PDR), a minimum improvement of 8.9% and a maximum of 19.5% is observed for the proposed protocol as compared to Kumar et al. protocol.
“…Lightweight cryptography can be classified into primitives and protocols. The goal of lightweight primitives is to achieve confidentiality, integrity, authentication, availability, and nonrepudiation [6]. Lightweight primitives can be classified as being either symmetric or asymmetric.…”
In resource‐constrained, low‐cost, radio‐frequency identification (RFID) sensor–based mobile ad hoc networks (MANETs), ensuring security without performance degradation is a major challenge. This paper introduces a novel combination of steps in lightweight protocol integration to provide a secure network for RFID sensor–based MANETs using error‐correcting codes (ECCs). The proposed scheme chooses a quasi‐cyclic ECC. Key pairs are generated using the ECC for establishing a secure message communication. Probability analysis shows that code‐based identification; key generation; and authentication and trust management schemes protect the network from Sybil, eclipse, and de‐synchronization attacks. A lightweight model for the proposed sequence of steps is designed and analyzed using an Alloy analyzer. Results show that selection processes with ten nodes and five subgroup controllers identify attacks in only a few milliseconds. Margrave policy analysis shows that there is no conflict among the roles of network members.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.