Citations


Contact Us

For Marketing, Sales and Subscriptions Inquiries
2637 E Atlantic Blvd #43110
Pompano Beach, FL 33062
USA

Conference List

Review of Information Engineering and Applications

June 2014, Volume 1, 1, pp 24-38

An Unified Approach by Implementing the Secured Authentication Protocol Scheme in Wireless Sensor Networks

R. Sujatha

,

M. Lawanya

R. Sujatha 1

M. Lawanya 2

  1. Principal, Holy Grace Academy of Engineering, Thrissur, Kerala, India 1

  2. Database Developer, Nabko systems and communications Pvt ltd, Bangalore India 2

on Google Scholar
on PubMed

Pages: 24-38

DOI: 10.18488/journal.79/2014.1.1/79.1.24.38

Share :


Abstract:

Wireless Sensor Networks (WSN) is an ad-hoc mobile network and is highly vulnerable to attacks because, it consists of various resource-constrained devices and they communicate via wireless links.  Security of group communication for large mobile wireless sensor network hinges on efficient authentication protocol scheme. Consequently, one of the most primary challenge, on endow with the security services in sensor nodes are key distribution. Secure communications in wireless sensor networks are critical.  As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed with pair-wise keys, LOCK (Localized Combinatorial Keying) and Structured Graphs etc.  Therefore, security with key distribution is a good factor considered in wireless sensor network communications.  The only requirement for a user is to send information in a reliable manner to the destination; this will be provided only with the security.  In this regard, a novel secured authentication protocol scheme with finger-print scheme provides full security and very good resilience is proposed.  It also has low transaction overhead and reduced less space overhead.  This novel method produces good improvements in the functionality of security.
Contribution/ Originality
This study is one of very few studies which have investigated in the area of Authentication in Wireless Sensor Networks.  Major threats are viewed and addressed with the dynamic password system.  With this dynamic methodology hacking of text-based password is not feasible.

Keywords:


Reference:

  1. http://www.eetimes.com/document.asp?doc_id=1278992.
  2. Daniele Puccinelli and Martin Haenggi, "Wireless sensor networks: Application and challenges of ubiquitous sensing," Third Quarter 2005, IEEE Circuits And Systems Magazine,1531-636X/05/$20.00©2005, IEEE, 2005.
  3. W. Qinghua and B. Ilangko, "Wireless sensor networks – An introduction, dept. of electronics and telecommunications, Norwegian University of Science and Technology, Norway." Available: www.intechopen.com.
  4. K. Sanjay, D. Deepti, and K. Mahesh, "An efficient key distribution scheme for wireless sensor networks using polynomial based schemes," 2012 International Conference on Information and Network Technology (ICINT 2012), IPCSIT (2012) © (2012) IACSIT Press, Singapore. Available: sanjay_kumar@benpour.com, 2012.
  5. K. Damandeep and S. Parminder, "Various OSI layer attacks and countermeasure to enhance the performance of WSNs during wormhole attack," Short Paper, ACEEE International Journal on Network Security, vol. 5, 2014.
  6. A. K. Phiza, K. K. Patidar, S. Gajendra, and T. Mukesh, "False misbehavior removal in clonal selection mechanism based on watchdog by the use of transition point in a wireless sensor network," Current Trends in Technology and Science, ISSN: 2279-0535, Issue: 4(June-July 2014), vol. 3, 2014.
  7. S. Vartika and S. Samjiv, "A review of existing security frameworks and encryption methods for wireless sensor networks," International Journal of Innovations & Advancement in Computer Science, IJIACS, ISSN 2347-8616, Issue 2, April 2014, vol. 3, 2014.
  8. P. C. Shahare and N. A. Chavan, "Secure and efficient sink node location privacy technique in WSN," International Journal of Application or Innovation in Engineering & Management (IJAIEM), ISSN 2319 – 4847, Issue 3, March 2014. Available: www.ijaiem.org,vol. 3, 2014.
  9. D. G. Murugaboopathi, V. Geta, V. Sujathabai, T. K. S. Rathish Babu, and S. Hariharasitaraman, "An analysis of threat’s in wireless sensor networks," International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277-128X, Issue 10, October 2012, vol. 2, 2012.

Statistics:

Google Scholor ideas Microsoft Academic Search bing Google Scholor

Funding:

Competing Interests:

Acknowledgement:


Related Article