Open Access iconOpen Access

ARTICLE

crossmark

Secure Localization Based Authentication (SLA) Strategy for Data Integrity in WNS

V. Manikandan1,*, M. Sivaram1, Amin Salih Mohammed2, V. Porkodi3, K. Shankar4

1 Assistant Professor Research, Research Center, Lebanese French University, Erbil, 44001, Iraq
2 Vice President, Lebanese French University, Erbil, 44001, Iraq
3 Department of Information Technology, College of Engineering and Computer Science, Lebanese French University, Erbil, 44001, Iraq
4 Department of Computer Applications, Alagappa University, Karaikudi, 630003, India

* Corresponding Author: V. Manikandan. Email: email

Computers, Materials & Continua 2021, 67(3), 4005-4018. https://doi.org/10.32604/cmc.2021.014643

Abstract

Wireless Sensor Networks (WSN) has been extensively utilized as a communication model in Internet of Things (IoT). As well, to offer service, numerous IoT based applications need effective transmission over unstable locations. To ensure reliability, prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs. Moreover, these models are affected by crucial denial of service (DoS) attacks, where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs. Here, secure localization based authentication (SLA) is presented to fight against DoS attack, and to fulfil the need of reliability and authentication. By examining state information, SLA projects a trust model to enhance efficacy of data delivery. Indeed, of the prevailing opportunistic protocols, SLA guarantees data integrity by modelling a trust based authentication, providing protection against DoS attackers and diminishing computational costs. Specifically, this model acts as a verification strategy to accelerate? attackers and to handle isolation. This strategy helps SLA in eliminating duplicate transmission and by continuous verification that results from conventional opportunistic routing. Simulation is performed in a MATLAB environment that offers authentic and reliable delivery by consuming approximately 50% of the cost in contrast to other approaches. The anticipated model shows better trade off in comparison to the prevailing ones.

Keywords


Cite This Article

V. Manikandan, M. Sivaram, A. Salih Mohammed, V. Porkodi and K. Shankar, "Secure localization based authentication (sla) strategy for data integrity in wns," Computers, Materials & Continua, vol. 67, no.3, pp. 4005–4018, 2021.



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1940

    View

  • 1029

    Download

  • 0

    Like

Share Link