International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 19 - Number 6 |
Year of Publication: 2011 |
Authors: Ashly Thomas, N. Dhinakaran, P. Anitha Christy Angelin |
10.5120/2369-3119 |
Ashly Thomas, N. Dhinakaran, P. Anitha Christy Angelin . A-SMOCK: Authenticated SMOCK for Wireless Sensor Networks. International Journal of Computer Applications. 19, 6 ( April 2011), 1-5. DOI=10.5120/2369-3119
The most major requirements of wireless networks in the current network context are security, scalability and memory efficiency. Most of the earlier implementations use cryptographic key exchanges alone for imposing security but mostly proved to be less secure with the presence of many attacks like IP-spoofing and masquerading. This is because, the security is present only during communication i.e., only message integrity is ensured and not the user authenticity. Hence we are trying to include an authentication scheme along with the already existing integrity scheme to provide maximum security all through the lifetime of networks. In this paper, we consider different options for providing authentication, analyze them and find which method can be used for producing better results