CFP last date
20 May 2024
Reseach Article

Authentication Protocol against Malicious Attack in Wireless Sensor Networks: A Review

by Amit Kumar, Sunil Gupta, Rashmi Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 58 - Number 4
Year of Publication: 2012
Authors: Amit Kumar, Sunil Gupta, Rashmi Sharma
10.5120/9272-3462

Amit Kumar, Sunil Gupta, Rashmi Sharma . Authentication Protocol against Malicious Attack in Wireless Sensor Networks: A Review. International Journal of Computer Applications. 58, 4 ( November 2012), 29-33. DOI=10.5120/9272-3462

@article{ 10.5120/9272-3462,
author = { Amit Kumar, Sunil Gupta, Rashmi Sharma },
title = { Authentication Protocol against Malicious Attack in Wireless Sensor Networks: A Review },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 58 },
number = { 4 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 29-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume58/number4/9272-3462/ },
doi = { 10.5120/9272-3462 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:01:37.233209+05:30
%A Amit Kumar
%A Sunil Gupta
%A Rashmi Sharma
%T Authentication Protocol against Malicious Attack in Wireless Sensor Networks: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 58
%N 4
%P 29-33
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nodes in a sensor network may be lost due to malicious attack or either power loss. To extend the life time of the sensor network the novel Authentication Protocol is needed to overcome the internal attacks. In a defense scenario the advisory or intruder may directly deploy the malicious node or manipulate existing node to introduce malicious new node to the network. This paper focus on Novel Authentication Protocol to provide a security solution against known malicious attacks. It provides better authentication protocol for access control in the sensor network. We also emphasis on the confidentiality for the information access in between the sensor networks. In this paper we review secure WSN user Authentication Protocol and its several security weaknesses. According to our analysis of security our protocol as compare to security, computation and communication cost is scalable for application with higher security requirements. Our protocol is well designed for sensor nodes which typically have limited resources with better authentication procedure that use one way hash function and smart cards can be implemented efficiently.

References
  1. Kirk H. M. Wong, Yuan Zheng, "A Dynamic User Authentication Scheme for Wireless Sensor Networks," Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06), Computer Society,2006.
  2. Tseng, H. R. ; Jan, R. H. ; Yang, W. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks. In Proceedings of IEEE Globecom, Washington, DC, USA, 26–30 November 2007; pp. 986-990.
  3. Lee-Chun Ko, "A Novel Dynamic User Authentication Scheme for Wireless Sensor Networks," IEEE ISWCS 2008, pp 608-612.
  4. Manik Lal Das, "Two-Factor User Authentication in Wireless Sensor Networks," IEEE transactions on wireless communications, vol. 8, no. 3, march 2009.
  5. Hui- Feng Huang and Ya-fen, "Enhancement of two factor user authentication in wireless sensor network," in sixth international conference on intelligent information hiding and multimedia signal processing,2010 IEEE . pp 27-30.
  6. M. K. Khan, and K. Alghathbar, "Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'", Sensors 2010, 10(3), pp. 2450-2459.
  7. Binod Vaidya, Dimitrios Makrakis, Hussein T. , "Improved Two-factor User Authentication in Wireless Sensor Networks," Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments IEEE-2010, pp -600-606.
  8. Da-Zhi Sun, Jian-Xin Li, Zhi-Yong Feng, Zhen-Fu Cao, Guang-Quan Xu, "On the security and improvement of a two-factor user authentication scheme in wireless sensor networks," published in Springer-2012.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Wireless Sensor Network Smart Card Security Attacks