Identity Based Authentication Scheme (IAS) for Securing WSN Based Internet of Things

Main Article Content

Zubair Ahmed Khan, Asha Ambhaikar

Abstract

The growing number of connected devices in IoT networks has raised security concerns. These networks face unique challenges, including limited resources, lack of standardized security protocols, and diverse devices and applications. Identity-based authentication is needed to address these threats and limitations. Implementing a multi-factor authentication system can enhance security and protect sensitive information from unauthorized access. The proposed Identity Based Authentication (IAS) scheme is implemented using the NS-2 simulator to address security challenges in IoT networks. Each node is assigned a unique identity for authentication, ensuring only authorized access and preventing security breaches. The IAS scheme enhances IoT network security by verifying node identities. Two scenarios are considered to evaluate the scalability and interoperability of the IAS scheme. The first scenario involves a random environment, assessing performance in real-world settings with varying device densities and network conditions. The second scenario involves a cluster-based environment, providing insights into the scheme's functionality and efficiency. By examining both scenarios, this research aims to provide a comprehensive understanding of how the authentication scheme performs in different deployment scenarios. The findings highlight the importance of selecting the appropriate authentication scheme based on the specific network environment and requirements. The superiority of the IAS authentication scheme suggests its potential for widespread adoption and implementation in various network scenarios over other authentication schemes.

Article Details

Section
Articles