An Unified Approach by Implementing the Secured Authentication Protocol Scheme in Wireless Sensor Networks
R Sujatha and
M Lawanya
Review of Information Engineering and Applications, 2014, vol. 1, issue 1, 24-38
Abstract:
Wireless Sensor Networks (WSN) is an ad-hoc mobile network and is highly vulnerable to attacks because, it consists of various resource-constrained devices and they communicate via wireless links. Security of group communication for large mobile wireless sensor network hinges on efficient authentication protocol scheme. Consequently, one of the most primary challenge, on endow with the security services in sensor nodes are key distribution. Secure communications in wireless sensor networks are critical. As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed with pair-wise keys, LOCK (Localized Combinatorial Keying) and Structured Graphs etc. Therefore, security with key distribution is a good factor considered in wireless sensor network communications. The only requirement for a user is to send information in a reliable manner to the destination; this will be provided only with the security. In this regard, a novel secured authentication protocol scheme with finger-print scheme provides full security and very good resilience is proposed. It also has low transaction overhead and reduced less space overhead. This novel method produces good improvements in the functionality of security.
Keywords: SAP (Secured Authentication Protocol); Authentication; WSN (Wireless Sensor Networks); Security; MAC (Message Authentication Code); Authentication protocol; Image based authentication protocol; Finger-print authentication (search for similar items in EconPapers)
Date: 2014
References: Add references at CitEc
Citations:
Downloads: (external link)
https://archive.conscientiabeam.com/index.php/79/article/view/2660/4136 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:pkp:roieaa:v:1:y:2014:i:1:p:24-38:id:2660
Access Statistics for this article
More articles in Review of Information Engineering and Applications from Conscientia Beam
Bibliographic data for series maintained by Dim Michael ().