A Multi-Attribute Trust-based Authentication Model for Internet of Things based Military Environment
B.Shadaksharappa1, Prabhudeva V2

1Dr. B. Shadaksharappa, Professor (CSE) & Principal, Sri Sairam College of Engineering, Anekal, Bengaluru, Karnataka,India, Affiliated to Visvesvaraya Technological University, Belagaum.
2Prabhudeva V, Enterprise Architect & Consultant, Tata Consultancy Services, Victor Building, ITPL, Bengaluru, Karnataka, India.
Manuscript received on March 16, 2020. | Revised Manuscript received on March 24, 2020. | Manuscript published on March 30, 2020. | PP: 2459-2465 | Volume-8 Issue-6, March 2020. | Retrieval Number: F7953038620/2020©BEIESP | DOI: 10.35940/ijrte.F7953.038620

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The Internet of Things (IoT) is an emerging field where physical objects are connected over the network, by the way, to make human life easy and more comfortable. The IoT environment is involved with various devices and those are working together to attain a common goal. The enhanced technology of IoT enables the military environment to work on it. Typically, most of the IoT devices are restricted in terms of their storage, process, compute and network capability. Hence, those devices are easy to attack and compromise. Compromised devices become behave as blackhole attacks. To assure the proper network function, we are in the situation to overcome those types of attacks. As trust plays a vital role in decision making, in this paper we proposed a Multi-attribute Trust-based Authentication mechanism (MTA). The ultimate aim of this model is to ensure authentication among the participating devices by identifying black hole nodes in the network. This multi-attribute trust calculation approach provides a maximum effort to evaluating the trustworthiness of devices. The simulation results show the applicability of the proposed model in terms of various performance metrics.
Keywords: Internet of Things, Military, Security, Authentication, Trust and Blackhole
Scope of the Article: Authentication, authorization, accounting.