The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off

   Subscribe/Renew Journal


Data exchanging and gathering is greatly achieved by several interconnected physical objects or smart devices over the Internet are termed as Internet of Things (IoT). A generic IoT network called Hierarchical IoT Network (HIoTN) inclusive of the organized different nodes in a hierarchy as gateway node, cluster head nodes and sensing nodes. In HIoTN of generic IoT networking environment for a particular application, user direct access in real-time data from the sensing nodes is necessitated. Recent work introduces a User Authenticated Biometric Key Management Protocol (UABKMP) for IoT network. Hence this proposed work exhibits new region of interest based segmentation algorithm with base procedure of Modified Bat optimization (MBO) algorithm hybrid with Active Contour Model. In the MBO algorithm the parameters of the bat is tuned via the use of the Brownian Distribution. Finally an Authenticated Key Management (AKM) is proposed for IoT network. The Real-Or-Random (ROR) model is incorporated in network for proving the scheme formal security and also ensures the informal security being protected from several probable attacks.

Keywords

Hierarchical IoT Network, Authentication, Key Management, Security, Segmentation, Modified Bat Optimization, Active Contour Model, Iris.
Subscription Login to verify subscription
User
Notifications
Font Size