Affiliation:
1. Computer Science and Business Systems R.M.D. Engineering College Chennai India
Abstract
SummaryA wireless sensor network (WSN) is a network of autonomous, small sensors that can detect, collect, and send data about their surrounding environment. In the Internet of Things (IoT) infrastructure, WSNs are the smart devices that provide the platform with resource input. Security breaches and insider attacks are possible due to the WSN's resource‐constrained design. However, the IoT platform's intelligence may be extended to WSN nodes for managing device and data‐level security. This paper proposes Monitored Access Constraint Security (MACS) to ensure the privacy of data collected via the ubiquitous processing enabled by the Internet of Things. The IoT platform performs frequent checks on the quality of the interactions between the various nodes to ensure that they are functioning properly and that the sensor aggregation instances are accountable. Node liability is considered while adjusting the aggregate level and the continuity. The method guarantees secure information from the environment and the data sources. The quality of the data gathered in the suggested technique is evaluated based on node liability and information extraction feature. Accordingly, security measures are implemented at data gathering and filtering levels and then assessed using a recurrent learning process. Since there are fewer security breaches overall, the rate of aggregation increases. Aggregation loss, delay time, false rate, throughput, and verification time are used to evaluate the performance.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure Adaptive Group Testing;IEEE Transactions on Information Forensics and Security;2024