![]() This research also identifies the key research trends that most of the researchers are paying attention to. This study finds the impact of the research in the selected domain using bibliometric analysis. Using Web of Science data of the research publications on the topic, the study adopted the bibliometric approach to find the evolution of authentication in the security domain, especially multi-factor authentication. Several studies have been done in the multi-factor authentica-tion discipline, and most of them proposed the best possible approaches, but there are very limited studies in the area that can comprehend all these innovative and effective approaches. With increasing threats to single authentication schemes, 2Factor and later multi-factor authentication approaches came into practice. Attacks on authentication occur even before digital access is given, but it becomes quite challenging with remote access to secure resources. Authentication is one of the important traits in the security domain as it ensures that legitimate users have access to the secure resource. ![]() ![]() This study presents the current state of research on multi-factor authen-tication. The results have shown that extra maximum energy consumption is approximately 12.9 percent of the system total energy consumed in information transmissions. It is performed by using a UWSN broad model. A numerical channel model is proposed to compute extra energy. In this paper, the cluster head setup period has been considered the main contributor to extra energy utilizer. In UWSN, the energy consumed during the formation of clusters has been considered casually or completely evaded in the previous works. Round base clustering strategy works in rounds, where each round comprises three fundamental stages: Cluster head selection, grouping or node association, and data aggregation followed by forwarding data to the sink. The environment of UWSN is 3D architecture-based and follows a complex hierarchical clustering strategy involving its most effecting unique parameters such as propagation delay and limited transmission bandwidth. This can effectively minimize the total energy loss during transmission. Systems based on clustering strategies, instead of each node sending information by itself, utilize cluster heads to collect information inside the clusters for forwarding collective information to sink. In an Underwater Wireless Sensor Network (UWSN), extreme energy loss is carried out by the early expiration of sensor nodes and causes a reduction in efficiency in the submerged acoustic sensor system.
0 Comments
Leave a Reply. |