Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Authentication Techniques for Wireless Sensor Network

Print
PDF
IJCA Proceedings on National Conference on Recent Trends in Computing
© 2012 by IJCA Journal
NCRTC - Number 5
Year of Publication: 2012
Authors:
Anand D. Dhawale
M. B. Chandak
N. V. Thakur

Anand D Dhawale, M B Chandak and N V Thakur. Article: Authentication Techniques for Wireless Sensor Network. IJCA Proceedings on National Conference on Recent Trends in Computing NCRTC(5):1-4, May 2012. Full text available. BibTeX

@article{key:article,
	author = {Anand D. Dhawale and M. B. Chandak and N. V. Thakur},
	title = {Article: Authentication Techniques for Wireless Sensor Network},
	journal = {IJCA Proceedings on National Conference on Recent Trends in Computing},
	year = {2012},
	volume = {NCRTC},
	number = {5},
	pages = {1-4},
	month = {May},
	note = {Full text available}
}

Abstract

Wireless sensor networks (WSNs) got high popularity due to broad range of applications. These networks have attracted tremendous researchers due to their unique characteristics that differ them from traditional wired networks. WSNs are special networks having great future ahead but at the same time suffer from many hazards due to their unique characteristics. They are having large number of low cost sensor nodes with low power (usually operated by battery), low processing ability, and communication and storage limitations. The nodes usually called as motes are tiny nodes deployed in target areas. Due to deployment nature and radio links the nodes are easily targeted by attacker with physical attack of node capture. If we think of applying security to WSNs we have to face the resource limitations constraints. The resource limitations don't allow to apply traditional mechanisms having large overhead and computational powers. Out of many security solutions authentication is one of the best solutions to secure the whole network. The network can be made secure if we allow only true information to be inserted from true node. Authentication can be efficiently used to check valid, fake and modified communication. Such authentication techniques in wireless sensor networks are analyzed in this paper and possible solution is suggested in future work.

References

  • Sunil Gupta, Harsh Kumar Verma"Authentication protocol for wireless sensor networks" Paper at World Academy of Science, Engineering and Technology 2010.
  • Dan Khanh Vu "Wireless Sensor Network Architecture And Its Security Challenges" Thesis submitted at California State University, Sacramento, 2010.
  • A. Perrig ETt Al. SPINS: Security Protocols for Sensor Networks. Wireless Networks vol. 8, 2002, Pages 521-534.
  • Q. Huang ET Al. Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks. WSNA '03, September 19, 2003, Pages 141-150
  • Rashmita Rautray and Itun Sarangi " A Survey on authentication Protocols for Wireless Sensor Networkss". International Journal of Engineering Science and Technology. 2011.
  • Siba Ugata, Alefiah Mubeen and Samrat Sabat " Wireless Sensor Network security using zero knowledge Protocol. IEEE communications ICC 2011 Proceedings.
  • Sami, S. , Al-Wakeel , S. , Al-Swailem, S. A. , PRSA: A Path Redundancy Based Security Algorithm for Wireless Sensor Networks, IEE WNC 2007 Proceedings, 2007
  • Rehana Yasmin, Eike Ritter " An Authentication Framework for Wireless Sensor Networks using identity based Signatures. " EPSRC Project 2010.
  • M. Tubaishat, S. Madria, (2003) "Sensor Networks : An Overview ", IEEE Potentials, April/May 2003
  • A. D. Wood and J. A. Stankovic,(2002) "Denial of service in sensor networks",Computer, 35(10):54–62, 2002.