We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Authentication Techniques for Wireless Sensor Network

Published on May 2012 by Anand D. Dhawale, M. B. Chandak, N. V. Thakur
National Conference on Recent Trends in Computing
Foundation of Computer Science USA
NCRTC - Number 5
May 2012
Authors: Anand D. Dhawale, M. B. Chandak, N. V. Thakur
6bd637e0-1c0a-4334-9065-4e8d22f3f8e1

Anand D. Dhawale, M. B. Chandak, N. V. Thakur . Authentication Techniques for Wireless Sensor Network. National Conference on Recent Trends in Computing. NCRTC, 5 (May 2012), 1-4.

@article{
author = { Anand D. Dhawale, M. B. Chandak, N. V. Thakur },
title = { Authentication Techniques for Wireless Sensor Network },
journal = { National Conference on Recent Trends in Computing },
issue_date = { May 2012 },
volume = { NCRTC },
number = { 5 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/ncrtc/number5/6543-1033/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computing
%A Anand D. Dhawale
%A M. B. Chandak
%A N. V. Thakur
%T Authentication Techniques for Wireless Sensor Network
%J National Conference on Recent Trends in Computing
%@ 0975-8887
%V NCRTC
%N 5
%P 1-4
%D 2012
%I International Journal of Computer Applications
Abstract

Wireless sensor networks (WSNs) got high popularity due to broad range of applications. These networks have attracted tremendous researchers due to their unique characteristics that differ them from traditional wired networks. WSNs are special networks having great future ahead but at the same time suffer from many hazards due to their unique characteristics. They are having large number of low cost sensor nodes with low power (usually operated by battery), low processing ability, and communication and storage limitations. The nodes usually called as motes are tiny nodes deployed in target areas. Due to deployment nature and radio links the nodes are easily targeted by attacker with physical attack of node capture. If we think of applying security to WSNs we have to face the resource limitations constraints. The resource limitations don't allow to apply traditional mechanisms having large overhead and computational powers. Out of many security solutions authentication is one of the best solutions to secure the whole network. The network can be made secure if we allow only true information to be inserted from true node. Authentication can be efficiently used to check valid, fake and modified communication. Such authentication techniques in wireless sensor networks are analyzed in this paper and possible solution is suggested in future work.

References
  1. Sunil Gupta, Harsh Kumar Verma"Authentication protocol for wireless sensor networks" Paper at World Academy of Science, Engineering and Technology 2010.
  2. Dan Khanh Vu "Wireless Sensor Network Architecture And Its Security Challenges" Thesis submitted at California State University, Sacramento, 2010.
  3. A. Perrig ETt Al. SPINS: Security Protocols for Sensor Networks. Wireless Networks vol. 8, 2002, Pages 521-534.
  4. Q. Huang ET Al. Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks. WSNA '03, September 19, 2003, Pages 141-150
  5. Rashmita Rautray and Itun Sarangi " A Survey on authentication Protocols for Wireless Sensor Networkss". International Journal of Engineering Science and Technology. 2011.
  6. Siba Ugata, Alefiah Mubeen and Samrat Sabat " Wireless Sensor Network security using zero knowledge Protocol. IEEE communications ICC 2011 Proceedings.
  7. Sami, S. , Al-Wakeel , S. , Al-Swailem, S. A. , PRSA: A Path Redundancy Based Security Algorithm for Wireless Sensor Networks, IEE WNC 2007 Proceedings, 2007
  8. Rehana Yasmin, Eike Ritter " An Authentication Framework for Wireless Sensor Networks using identity based Signatures. " EPSRC Project 2010.
  9. M. Tubaishat, S. Madria, (2003) "Sensor Networks : An Overview ", IEEE Potentials, April/May 2003
  10. A. D. Wood and J. A. Stankovic,(2002) "Denial of service in sensor networks",Computer, 35(10):54–62, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network Attacks Security Authentication