1
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Efficient security level in wireless sensor networks (WSNs) using four-factors authentication over the Internet of Things (IoT)

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          With the increasing demand for the use of technology in all matters of daily life and business, the demand has increased dramatically to transform business electronically especially regards COVID-19. The Internet of Things (IoT) has greatly helped in accomplishing tasks. For example, at a high temperature, it would be possible to switch on the air conditioner using a personal mobile device while the person is in the car. The Internet of Things (IoT) eases lots of tasks. A wireless sensor network is an example of IoT. Wireless sensor network (WSN) is an infrastructure less self-configured that can monitor environmental conditions such as vibration, temperature, wind speed, sound, pressure, and vital signs. Thus, WSNs can occur in many fields. Smart homes give a good example of that. The security concern is important, and it is an essential requirement to ensure secure data. Different attacks and privacy concerns can affect the data. Authentication is the first defence line against threats and attacks. This study proposed a new protocol based on using four factors of authentication to improve the security level in WSN to secure communications. The simulation results prove the strength of the proposed method which reflects the importance of the usage of such protocol in authentication areas.

          Related collections

          Most cited references47

          • Record: found
          • Abstract: not found
          • Article: not found

          Applications of wireless sensor networks for urban areas: A survey

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            The state of play of blockchain technology in the financial services sector: A systematic literature review

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices

                Bookmark

                Author and article information

                Contributors
                Journal
                PeerJ Comput Sci
                PeerJ Comput Sci
                peerj-cs
                PeerJ Computer Science
                PeerJ Inc. (San Diego, USA )
                2376-5992
                28 June 2024
                2024
                : 10
                : e2091
                Affiliations
                [1 ]Department of Computer Science, Applied College, Imam Abdulrahman Bin Faisal University , Dammam, Saudi Arabia
                [2 ]Department of Information Technology, College of Computers and Information Technology, Taif University , Taif, Saudi Arabia
                [3 ]Department of Computer Science, College of Science & Art, King Khalid University , Mahayil, Saudi Arabia
                [4 ]Saudi Aramco Cybersecurity Chair, Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University , Dammam, Saudi Arabia
                [5 ]Saudi Aramco Cybersecurity Chair, Department of Networks and Communications, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University , Dammam, Saudi Arabia
                Article
                cs-2091
                10.7717/peerj-cs.2091
                11232626
                38983196
                1d6a01c0-6d72-433e-9bfc-661e5bb9ee2f
                ©2024 Alsumayt et al.

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.

                History
                : 8 September 2023
                : 7 May 2024
                Funding
                Funded by: The SAUDI ARAMCO Cybersecurity Chair
                The SAUDI ARAMCO Cybersecurity Chair funded this article. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
                Categories
                Computer Networks and Communications
                Cryptography
                Security and Privacy
                Social Computing
                Internet of Things

                iot,wsn,homomorphic encryption,fingerprint biometrics,ultrasonic sensor,security,privacy,authentication,federated learning

                Comments

                Comment on this article