Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.4.51Keywords:
Trusted third party, Physical unclonable function, Wireless sensor network, Internet of Things, Cluster node, Device fingerprint, X-OR operation.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
In the modern digital world, the Internet of Things (IoT) is a modern and advanced technology that interconnects many immeasurable devices. The collection of wireless sensors formed the wireless sensor network. WSN nodes are battery-powered nodes with limited power and computational capability. When using loT-based wireless sensor networks, the nodes are used to communicate with the internet, where there is a need for more secure protocols. In this technological era where time factor plays a key role in everyone’s personal busy life. The need for smart and sensor appliances that work without human intervention can be a solution to some extent for the time factor. IoT is a network where physical objects, vehicles, devices, buildings and many other smart devices are electronically embedded with hardware and software with huge network connectivity. But the communication and data exchange are not that much easy to carry out, it requires a high secured protocol for authentication as well as key encryptions. Besides focusing on secured key distribution importance for enhancing various parameters are also considered which includes, EC additions, multiplications, pairing, hash-to-point operations, security performances, and energy consumption are also considered. In this paper, focuses on “LSTTP” which authenticates the nodes based on the Device Finger Print (DFP) with a Trusted Third Party and proposes the algorithm for enhancing the quality of service parameters such as Throughput, Jitter, Latency and Security.Abstract
How to Cite
Downloads
Similar Articles
- Radha K. Jana, Dharmpal Singh, Saikat Maity, Modified firefly algorithm and different approaches for sentiment analysis , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Sonal R. Vasant, Synthesis and characterization of pure and magnesium ion doped CPPD nanoparticles , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Vijai Pillarsetti, K. Madhava Rao, The craft of portfolio construction in estate planning: A comprehensive review on equity and mutual fund strategies, and its risks , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- S. Bhuvaneswari, A. Nisha Jebaseeli, Multi-model telecom churn prediction , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Rattan Singh, Sushil Gupta, Anil Kumar, EFFECTS OF SOURCES, INFORMATION, COMMUNICATION AND KNOWLEDGE IN HIV/AIDS AWARENESS PROGRAMME IN PUNJAB. , The Scientific Temper: Vol. 1 No. 01 (2010): The Scientific Temper
- Aditi Mishra, Manish Dev Sharma, Archna Tandon, Farah Ahsan, Rajesh Rayal, Naveen Gaurav, Pankaj Pant, Impacts and Causes of Female Infertility: An Observational Study , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Syam Sundar. S, Direct reuse of scour and bleach effluent water for cotton knitted fabrics , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Nand Kishore, Abhaya Kumar Singh, THE ROLE OF REMOTE SENSING TECHNOLOGY IN COUNTERNAXALITE OPERATIONS: PROBLEMS AND PROSPECTS , The Scientific Temper: Vol. 1 No. 01 (2010): The Scientific Temper
- Krutuja S. Gadgil, Prabodh Khampariya, Shashikant M. Bakre, Investigation of power quality problems and harmonic exclusion in the power system using frequency estimation techniques , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
You may also start an advanced similarity search for this article.

