Secure Authentication in Wireless Sensor Networks

Padam Jain

Abstract


In every situation, a wireless sensor network (WSN) is capable of monitoring, retrieving, and transferring data. The protection of the internet of things (IoT) network, a sort of WSN, has always been a major issue. There are several security-related hazards in this network. An important security challenge is node identity authentication. Traditional IoT security methods rely on reliable outside parties. They might fail at a particular stage. As a result, the model is suggested in this chapter as a way to address the security issues raised by blockchain principles. Therefore, a trust model based on blockchain is provided in this chapter enabling WSN to communicate with multiple nodes without any security problems.

References


Whig, P., & Ahmad, S. N. (2014). Development of economical ASIC for PCS for water quality monitoring. Journal of Circuits, Systems and Computers, 23(06), 1450079.

Jiwani, N., & Gupta, K. (2019). Comparison of Various Tools and Techniques used for Project Risk Management. International Journal of Machine Learning for Sustainable Development, 1(1), 51-58.

Gessner, Guy H., Volonino, Linda (2005). Quick Response Improves Returns on Business Intelligence Investments, Information Systems Management, 22(3), 66 -74.

Whig, P. and Naseem Ahmad, S. (2014), "Simulation of linear dynamic macro model of photo catalytic sensor in SPICE", COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, Vol. 33 No. 1/2, pp. 611-629. https://doi.org/10.1108/COMPEL-09-2012-0160

Ghoshal, S., Kim, S. K. (1986). Building Effective Intelligence Systems for Competitive Advantage, Sloan Management Review, 28(1), 49–58.

Gilad, B., Gilad, T. (1986). SMR Forum: Business Intelligence , The Quiet Revolution, Sloan Management Review, 27(4), 53–61.


Refbacks

  • There are currently no refbacks.