International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 58 - Number 4 |
Year of Publication: 2012 |
Authors: Amit Kumar, Sunil Gupta, Rashmi Sharma |
10.5120/9272-3462 |
Amit Kumar, Sunil Gupta, Rashmi Sharma . Authentication Protocol against Malicious Attack in Wireless Sensor Networks: A Review. International Journal of Computer Applications. 58, 4 ( November 2012), 29-33. DOI=10.5120/9272-3462
Nodes in a sensor network may be lost due to malicious attack or either power loss. To extend the life time of the sensor network the novel Authentication Protocol is needed to overcome the internal attacks. In a defense scenario the advisory or intruder may directly deploy the malicious node or manipulate existing node to introduce malicious new node to the network. This paper focus on Novel Authentication Protocol to provide a security solution against known malicious attacks. It provides better authentication protocol for access control in the sensor network. We also emphasis on the confidentiality for the information access in between the sensor networks. In this paper we review secure WSN user Authentication Protocol and its several security weaknesses. According to our analysis of security our protocol as compare to security, computation and communication cost is scalable for application with higher security requirements. Our protocol is well designed for sensor nodes which typically have limited resources with better authentication procedure that use one way hash function and smart cards can be implemented efficiently.