FAN: Framework for Authentication of Nodes in Mobile Adhoc Environment of Internet-of-Things
The Mobile Adhoc Network (MANET) has undergone significant improvement in the form of routing capabilities but still it lacks security potentials owing to its dynamic topology problems. Adoption of MANET in ubiquitous environment e.g. Internet-of-Things (IoT) could significant increase the communication capability but it could introduce significant level of threats too at same time. Therefore, the proposed manuscript introduces a Framework for Authentication (FAN) of mobile nodes where the technique first offers light-weight ciphering technique to initial stage of node communication followed by providing a significant access permission to authorized mobile nodes only to participate in data dissemination process. This analytical technique is also proven to offer communication efficiency apart from security against major potential threats on IoT environment.
KeywordsInternet-of-Things Mobile adhoc network Security Access control Secure permission Ubiquitous
- 11.Chauvenet, C., Etheve, G., Sedjai, M., Sharma, M.: G3-PLC based IoT sensor networks for SmartGrid. In: 2017 IEEE International Symposium on Power Line Communications and Its Applications (ISPLC), Madrid, pp. 1–6 (2017)Google Scholar
- 15.Deogirikar, J., Vidhate, A.: Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, pp. 32–37 (2017)Google Scholar
- 16.Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), Pune, pp. 1–6 (2015)Google Scholar
- 31.Anil, G.N., Venugopal Reddy, A.: Semantic probabilistic modelling of novel routing protocol with implication of cumulative routing attack in mobile adhoc network. Int. J. Comput. Sci. Issues 9(1) (2012)Google Scholar
- 32.Anil, G.N., Venugopal Reddy, A.: Strategical modelling with virtual competition for analyzing behavior of malicious node in mobile Adhoc network to prevent decamping. Int. J. Comput. Sci. Issues 8(6) (2011)Google Scholar