A Trust-Based Access Control Mechanism for Intra-Sensor Network Communication in Internet of Things

  • PDF / 549,583 Bytes
  • 7 Pages / 595.276 x 790.866 pts Page_size
  • 21 Downloads / 187 Views

DOWNLOAD

REPORT


RESEARCH ARTICLE-COMPUTER ENGINEERING AND COMPUTER SCIENCE

A Trust-Based Access Control Mechanism for Intra-Sensor Network Communication in Internet of Things S. Sakthivel1 · G. Vidhya1 Received: 7 July 2020 / Accepted: 31 October 2020 © King Fahd University of Petroleum & Minerals 2020

Abstract The Internet of Things (IoT) can integrate both the physical and the information world to provide applications and services. IoT networks permit users, applications and devices in various physical locations for easy and seamless communication with each other. Data are sometimes quite sensitive in nature based on whether they are from one single IoT subsystem or an aggregation of multiple systems. Securing data becomes crucial and data access will have to be controlled. The IoT cloud can pose several challenges to the scale of IoT systems that help in identifying all real challenges in the cloud services. The main components of the access control mechanisms are authentication and authorization. Trust can permit the device with a natural judging method for other devices and the way in which security can be handled along with access control. A trust relationship between two different devices will help in influencing the future behaviour of interactions. Trust-based systems have been proposed in the literature, but not much work has been done to decrease the computational time in encryption system which is critical for low powered sensor devices. This work proposed a novel authentication mechanism ”Trust-Level-Public Key Authentication” which is used to connect between the nodes for data transfer which is efficient. This work was supported by a system of remote key management in the cloud and used for aggregating encrypted data. The levels of authorization in the nodes were controlled remotely. The experimental results showed that average consumption of energy (J) with the trust system to have performed better by about 11.5%, 12.6%, 17.6%, 14.2%, 13.5% and by about 15.9% when compared to the average consumption of energy (J) without a trust system that is used for the number of nodes 250, 500, 750, 1000, 1250, and 1500, respectively. Keywords Internet of Things (IoT) · Security · Trust · Aggregation trust data · Trust-level-public key authentication

1 Introduction Internet of Things (loT) is emerging as an Internet-based information architecture that facilitates the exchange of both goods and services for the network of global supply chains. IoT’s are new and also comprehensive as a network that is characterized by a heterogeneous interconnection, multiple field perception and intelligent perception in industry and academia [1]. Apart from this, the applications of IoT are inevitable. It poses a great challenge in terms of privacy and security. For instance, a security attack, which is vulnerable

B

G. Vidhya [email protected] S. Sakthivel [email protected]

1

Department of Computer Science and Engineering, Sona College of Technology, Salem, India

on a smart healthcare system, may result in loss of patients’ lives and