Wireless Sensor Networks (WSN) is an ad-hoc mobile network and is highly vulnerable to attacks because, it consists of various resource-constrained devices and they communicate via wireless links. Security of group communication for large mobile wireless sensor network hinges on efficient authentication protocol scheme. Consequently, one of the most primary challenge, on endow with the security services in sensor nodes are key distribution. Secure communications in wireless sensor networks are critical. As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed with pair-wise keys, LOCK (Localized Combinatorial Keying) and Structured Graphs etc. Therefore, security with key distribution is a good factor considered in wireless sensor network communications. The only requirement for a user is to send information in a reliable manner to the destination; this will be provided only with the security. In this regard, a novel secured authentication protocol scheme with finger-print scheme provides full security and very good resilience is proposed. It also has low transaction overhead and reduced less space overhead. This novel method produces good improvements in the functionality of security.
This study is one of very few studies which have investigated in the area of Authentication in Wireless Sensor Networks. Major threats are viewed and addressed with the dynamic password system. With this dynamic methodology hacking of text-based password is not feasible.
W. Qinghua and B. Ilangko, "Wireless sensor networks – An introduction, dept. of electronics and telecommunications, Norwegian University of Science and Technology, Norway." Available: www.intechopen.com.
K. Damandeep and S. Parminder, "Various OSI layer attacks and countermeasure to enhance the performance of WSNs during wormhole attack," Short Paper, ACEEE International Journal on Network Security, vol. 5, 2014.
A. K. Phiza, K. K. Patidar, S. Gajendra, and T. Mukesh, "False misbehavior removal in clonal selection mechanism based on watchdog by the use of transition point in a wireless sensor network," Current Trends in Technology and Science, ISSN: 2279-0535, Issue: 4(June-July 2014), vol. 3, 2014.
S. Vartika and S. Samjiv, "A review of existing security frameworks and encryption methods for wireless sensor networks," International Journal of Innovations & Advancement in Computer Science, IJIACS, ISSN 2347-8616, Issue 2, April 2014, vol. 3, 2014.
P. C. Shahare and N. A. Chavan, "Secure and efficient sink node location privacy technique in WSN," International Journal of Application or Innovation in Engineering & Management (IJAIEM), ISSN 2319 – 4847, Issue 3, March 2014. Available: www.ijaiem.org,vol. 3, 2014.
D. G. Murugaboopathi, V. Geta, V. Sujathabai, T. K. S. Rathish Babu, and S. Hariharasitaraman, "An analysis of threat’s in wireless sensor networks," International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277-128X, Issue 10, October 2012, vol. 2, 2012.