Energy-Perceptive Authentication in Virtual Private Networks Using GPS Data

In Zaigham Mahmood (ed.), Security, Privacy and Trust in the Iot Environment. Springer Verlag. pp. 25-38 (2019)
  Copy   BIBTEX

Abstract

The Internet of Things enables communication between diverse devices from different vendors via a common platform that provides the necessary support in making the communication possible. These are generally unsupervised networks that are liable to threats arising from different kinds of external attacks. Hence, the security of devices, communication, and data becomes a priority issue in this kind of setup. One of the preliminary measures considered to combat these threats is Authentication, which acts as a preventive approach. It aids in detecting the legitimacy of the communicating parties, whether humans or other interconnected smart devices. Another approach to enhance security is the use of Virtual Private Network, which is slowly replacing the wired networks. The data transmitted in these wireless networks often remains more secure and reliable. This chapter discusses the VPN methodology, presents the relevant analysis and the outcomes. The proposed study utilizes the Virtual Private Network infrastructure setup and adopts Mutual authentication protocols, using the Global Positioning System, before proceeding with the actual data transmission. We establish that authentication using Global Positioning System considerably enhances the overall security of the network. Furthermore, considering that energy is a scarce resource, we discuss the preservation of the same. The work we present reduces energy consumption by 82% compared to the previous similar studies. In our proposal, the authentication keys generated are different for every session. This measure also tackles Wormhole attacks in the network. It ensures a 4% increase in security in comparison to previously published work. The proposed work also preserves forward-secrecy.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,628

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Network Management of Predictive Mobile Networks.Stephen Bush, Frost F., S. Victor, Joseph Evans & B. - 1999 - Journal of Network and Systems Management 7 (2).
Networking in the Arts and Humanities: ave atque vale HAN News.Howard Senter - 2003 - Arts and Humanities in Higher Education 2 (2):187-200.

Analytics

Added to PP
2020-06-17

Downloads
4 (#1,619,050)

6 months
2 (#1,185,463)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references