Wireless Sensor Network (WSN) is a spatially distributed network. It contains many numbers of distributed, self-directed, small, battery powered devices called sensor nodes or motes. In recent years the deployment of WSN in various application domains are growing in a rapid pace as with the upcoming boom of Internet of Things (IoT) and Internet of Everything (IoE). However, the effectiveness of the WSN deployment is restricted due to the constrained computation and power source. Hence, many researchers have been proposing new approaches and models to improve the efficiency of the domain specific WSN deployment procedures. Though, many research communities addressing various issues in WSN deployment, still the privacy and security of such networks are susceptible to various network attacks. Thus, it is necessary to practice different models for authentication and privacy preservation in a highly dynamic resource constrained WSN environment to realize the effectiveness and efficiency of the deployment. Hence, this paper addressing an authentication scheme that can reduce energy consumption without compromising on security and privacy. In order to provide a light weight authentication mechanism, this paper proposing an authentication mechanism for WSN deployment by combining the features of Elliptic Curve Cryptography (ECC) and Hexagonal numbers. The feature of ECC is used to reduce the key size and the effectiveness of generating hexagonal numbers is used for minimizing the energy consumption in a resource constrained WSN environment. The results of the proposed approach are evaluated with the different authentication models and the results were indicating that the proposed approach can perform better than the other approaches.
PurposeIn wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user authentication must be focused.Design/methodology/approachIn previous works, for secured authentication, Enhanced User Authentication Protocol (EUAP) is presented. On the other hand, the user free password generation is permitted in the previous technique.FindingsHere, password leakage may cause a malevolent user's contribution to the WSN environment. By presenting the Flexible and Secured User Authentication Protocol (FSUAP), this is solved in the presented technique in which secured as well as reliable sharing of data contents via unsecured wireless sensor devices was accomplished.Originality/valueThe foremost objective of the present technique is to device the protocol that would verify the users beforehand letting them access the sensor devices situated in various sites. The use of a sensor device could be reduced in a significant way. Three-factor authentication protocols are presented in place of two-factor authentication protocol in the presented technique that could deal with and safeguard the environment from a brute force attack in an effective manner.
<span>Consumers are the most important asset of any organization. The commercial activity of an organization booms with the presence of a loyal customer who is visibly content with the product and services being offered. In a dynamic market, understanding variations in client’s behavior can help executives establish operative promotional campaigns. A good number of new consumers are frequently picked up by traders during promotions. Though, several of these engrossed consumers are one-time deal seekers, the promotions undeniably leave a positive impact on sales. It is crucial for traders to identify who can be converted to loyal consumer and then have them patronize products and services to reduce the promotion cost and increase the return on investments. This study integrates a classifier that allows prediction of the type of purchase that a customer would make, as well as the number of visits that he/she would make during a year. The proposed model also creates outlines of users and brands or items used by them. These outlines may not be useful only for this particular prediction task, but could also be used for other important tasks in e-commerce, such as client segmentation, product recommendation and client base growth for brands.</span>
Elliptic Curves when compared to other encryptions scheme such as RSA etc., provides an equivalent security, smaller key sizes, less power consumption, faster calculations, less bandwidth used and is more suitable for Internet of Things devices. In addition of encrypting the data, the devices in the network should also be able to authenticate themselves, which can be achieved with the implementation of "Non-Interactive Zero Knowledge protocol" (NIZKP). This protocol involves two parties: The prover and the Verifier. Prover party should prove to the Verifier that they have the knowledge of something, without revealing what is it. In this paper, a study of Schnorr protocol or ∑protocol over Elliptic Curves is done and the protocol is implemented in Python using the Python Cryptography Toolkit PyCrypto which is a collection of cryptographic modules implementing various algorithms and protocols. Finally, the results were compared with Elliptic Curve Diffie-Hellmann(ECDH) and present a performance evaluation of the protocols on the Raspberry Pi 3B model, a credit-card sized computer used for the development of IoT devices hence the perfect platforms to test the protocol.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.