Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.4.51Keywords:
Trusted third party, Physical unclonable function, Wireless sensor network, Internet of Things, Cluster node, Device fingerprint, X-OR operation.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
In the modern digital world, the Internet of Things (IoT) is a modern and advanced technology that interconnects many immeasurable devices. The collection of wireless sensors formed the wireless sensor network. WSN nodes are battery-powered nodes with limited power and computational capability. When using loT-based wireless sensor networks, the nodes are used to communicate with the internet, where there is a need for more secure protocols. In this technological era where time factor plays a key role in everyone’s personal busy life. The need for smart and sensor appliances that work without human intervention can be a solution to some extent for the time factor. IoT is a network where physical objects, vehicles, devices, buildings and many other smart devices are electronically embedded with hardware and software with huge network connectivity. But the communication and data exchange are not that much easy to carry out, it requires a high secured protocol for authentication as well as key encryptions. Besides focusing on secured key distribution importance for enhancing various parameters are also considered which includes, EC additions, multiplications, pairing, hash-to-point operations, security performances, and energy consumption are also considered. In this paper, focuses on “LSTTP” which authenticates the nodes based on the Device Finger Print (DFP) with a Trusted Third Party and proposes the algorithm for enhancing the quality of service parameters such as Throughput, Jitter, Latency and Security.Abstract
How to Cite
Downloads
Similar Articles
- R. Rita Jenifer, V. Sinthu Janita, Energy-aware Security Optimized Elliptic Curve Digital Signature Algorithm for Universal IoT Networks , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- S. Munawara Banu, M. Mohamed Surputheen, M. Rajakumar, Enhanced AOMDV-based multipath routing approach for mobile ad-hoc network using ETX and ant colony optimization , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- R. Prabhu, P. Archana, S. Anusooya, P. Anuradha, Improved Steganography for IoT Network Node Data Security Promoting Secure Data Transmission using Generative Adversarial Networks , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- R. Selvakumar, A. Manimaran, Janani G, K.R. Shanthy, Design and development of artificial intelligence assisted railway gate controlling system using internet of things , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- S. Dhivya, S. Prakash, Power quality assessment in solar-connected smart grids via hybrid attention-residual network for power quality (HARN-PQ) , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Deena Merit C K , Haridass M, Analysis of multiple sleeps and N-policy on a M/G/1/K user request queue in 5g networks base station , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- D. Prabakar, Santhosh Kumar D.R., R.S. Kumar, Chitra M., Somasundaram K., S.D.P. Ragavendiran, Narayan K. Vyas, Task offloading and trajectory control techniques in unmanned aerial vehicles with Internet of Things – An exhaustive review , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Vishakha Khambhati, Rajan Kumar Singh, Assessment of Respiratory Dynamics from ECG during Physical Exertion , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- Rekha Raghavendra, Shobha Gowda, Jissy Thomas, Fingerprint doorlock system using Arduino uno , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.

