2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013) |
Foundation of Computer Science USA |
NCIPET - Number 2 |
November 2013 |
Authors: Shifa S Sayyed, S R Jain |
650e7e1c-9b53-403b-9e21-29f70dbbabd5 |
Shifa S Sayyed, S R Jain . Literature Survey on Security techniques and Authentication Protocols for Wireless Sensor Networks. 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013). NCIPET, 2 (November 2013), 4-7.
Wireless sensor networks (WSNs) have gained attention Worldwide in recent years. Because of potential of physical isolation, these sensors have wide range of applications in land based security, military security and much more. As WSNs exchange there environmental conditions with each other, security become important aspect. In WSNs due to battery constraint problem, efficient secure and authentication algorithm is needed which take much lesser time to execution time. In this paper different authentication algorithms are introduced. Most of the literatures indicate that it is impossible to implement cryptographical algorithm because of its battery issue. Many symmetric and asymmetric algorithms have been implemented till yet with large keys. Some papers have provided different keys execution with time constraints.