National Conference on Recent Trends in Computing |
Foundation of Computer Science USA |
NCRTC - Number 5 |
May 2012 |
Authors: Anand D. Dhawale, M. B. Chandak, N. V. Thakur |
6bd637e0-1c0a-4334-9065-4e8d22f3f8e1 |
Anand D. Dhawale, M. B. Chandak, N. V. Thakur . Authentication Techniques for Wireless Sensor Network. National Conference on Recent Trends in Computing. NCRTC, 5 (May 2012), 1-4.
Wireless sensor networks (WSNs) got high popularity due to broad range of applications. These networks have attracted tremendous researchers due to their unique characteristics that differ them from traditional wired networks. WSNs are special networks having great future ahead but at the same time suffer from many hazards due to their unique characteristics. They are having large number of low cost sensor nodes with low power (usually operated by battery), low processing ability, and communication and storage limitations. The nodes usually called as motes are tiny nodes deployed in target areas. Due to deployment nature and radio links the nodes are easily targeted by attacker with physical attack of node capture. If we think of applying security to WSNs we have to face the resource limitations constraints. The resource limitations don't allow to apply traditional mechanisms having large overhead and computational powers. Out of many security solutions authentication is one of the best solutions to secure the whole network. The network can be made secure if we allow only true information to be inserted from true node. Authentication can be efficiently used to check valid, fake and modified communication. Such authentication techniques in wireless sensor networks are analyzed in this paper and possible solution is suggested in future work.