BIO-INSPIRED BASED SEGMENTATION AND USER AUTHENTICATED KEY MANAGEMENT FOR IOT NETWORKS
Abstract
vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff00d42b00000098a5080001000700
Data exchanging and gathering is greatly achieved by several interconnected physical objects or smart devices over the Internet are termed as Internet of Things (IoT). A generic IoT network called Hierarchical IoT Network (HIoTN) inclusive of the organized different nodes in a hierarchy as gateway node, cluster head nodes and sensing nodes. In HIoTN of generic IoT networking environment for a particular application, user direct access in real-time data from the sensing nodes is necessitated. Recent work introduces a User Authenticated Biometric Key Management Protocol (UABKMP) for IoT network. Hence this proposed work exhibits new region of interest based segmentation algorithm with base procedure of Modified Bat optimization (MBO) algorithm hybrid with Active Contour Model. In the MBO algorithm the parameters of the bat is tuned via the use of the Brownian Distribution. Finally an Authenticated Key Management (AKM) is proposed for IoT network. The Real-Or-Random (ROR) model is incorporated in network for proving the scheme formal security and also ensures the informal security being protected from several probable attacks.

Authors
M Savitha1, M Senthilkumar2
Government Arts College, Udumalpet, India1, Government Arts and Science College, Avinashi, India2

Keywords
Hierarchical IoT Network, Authentication, Key Management, Security, Segmentation, Modified Bat Optimization, Active Contour Model, Iris
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
000100000000
Published By :
ICTACT
Published In :
ICTACT Journal on Communication Technology
( Volume: 12 , Issue: 1 , Pages: 2265-2271 )
Date of Publication :
March 2021
Page Views :
348
Full Text Views :
4

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.