Open Access
ARTICLE
Secure Localization Based Authentication (SLA) Strategy for Data Integrity in WNS
1 Assistant Professor Research, Research Center, Lebanese French University, Erbil, 44001, Iraq
2 Vice President, Lebanese French University, Erbil, 44001, Iraq
3 Department of Information Technology, College of Engineering and Computer Science, Lebanese French University, Erbil, 44001, Iraq
4 Department of Computer Applications, Alagappa University, Karaikudi, 630003, India
* Corresponding Author: V. Manikandan. Email:
Computers, Materials & Continua 2021, 67(3), 4005-4018. https://doi.org/10.32604/cmc.2021.014643
Received 05 October 2020; Accepted 10 November 2020; Issue published 01 March 2021
Abstract
Wireless Sensor Networks (WSN) has been extensively utilized as a communication model in Internet of Things (IoT). As well, to offer service, numerous IoT based applications need effective transmission over unstable locations. To ensure reliability, prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs. Moreover, these models are affected by crucial denial of service (DoS) attacks, where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs. Here, secure localization based authentication (SLA) is presented to fight against DoS attack, and to fulfil the need of reliability and authentication. By examining state information, SLA projects a trust model to enhance efficacy of data delivery. Indeed, of the prevailing opportunistic protocols, SLA guarantees data integrity by modelling a trust based authentication, providing protection against DoS attackers and diminishing computational costs. Specifically, this model acts as a verification strategy to accelerate? attackers and to handle isolation. This strategy helps SLA in eliminating duplicate transmission and by continuous verification that results from conventional opportunistic routing. Simulation is performed in a MATLAB environment that offers authentic and reliable delivery by consuming approximately 50% of the cost in contrast to other approaches. The anticipated model shows better trade off in comparison to the prevailing ones.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.