Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.4.51Keywords:
Trusted third party, Physical unclonable function, Wireless sensor network, Internet of Things, Cluster node, Device fingerprint, X-OR operation.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
In the modern digital world, the Internet of Things (IoT) is a modern and advanced technology that interconnects many immeasurable devices. The collection of wireless sensors formed the wireless sensor network. WSN nodes are battery-powered nodes with limited power and computational capability. When using loT-based wireless sensor networks, the nodes are used to communicate with the internet, where there is a need for more secure protocols. In this technological era where time factor plays a key role in everyone’s personal busy life. The need for smart and sensor appliances that work without human intervention can be a solution to some extent for the time factor. IoT is a network where physical objects, vehicles, devices, buildings and many other smart devices are electronically embedded with hardware and software with huge network connectivity. But the communication and data exchange are not that much easy to carry out, it requires a high secured protocol for authentication as well as key encryptions. Besides focusing on secured key distribution importance for enhancing various parameters are also considered which includes, EC additions, multiplications, pairing, hash-to-point operations, security performances, and energy consumption are also considered. In this paper, focuses on “LSTTP” which authenticates the nodes based on the Device Finger Print (DFP) with a Trusted Third Party and proposes the algorithm for enhancing the quality of service parameters such as Throughput, Jitter, Latency and Security.Abstract
How to Cite
Downloads
Similar Articles
- K. Sreenivasulu, Sampath S, Arepalli Gopi, Deepak Kartikey, S. Bharathidasan, Neelam Labhade Kumar, Advancing device and network security for enhanced privacy , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Trust aware clustering approach for the detection of malicious nodes in the WSN , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- V. Umadevi, S. Ranganathan, IoT based energy aware local approximated MapReduce fuzzy clustering for smart healthcare data transmission , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Enhanced malicious node identification in WSNs with directed acyclic graphs and RC4-based encryption , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Unified framework for sybil attack detection in mobile ad hoc networks using machine learning approach , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- M. Deepika, I Antonitte Vinoline, Optimization of an Advanced Integrated Inventory Model Considering Shortages and Deterioration across Varying Demand Functions , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- Elangovan G. Reddy, Anjana Devi V, Subedha V, Tirapathi Reddy B, Viswanathan R, A smart irrigation monitoring service using wireless sensor networks , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Annalakshmi D, C. Jayanthi, A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Energy efficient techniques for iot application on resource aware fog computing paradigm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- R. Rita Jenifer, V. Sinthu Janita, Energy-aware Security Optimized Elliptic Curve Digital Signature Algorithm for Universal IoT Networks , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.

