Shared Secret Key with Random Value Authentication Scheme in Wireless Sensor Networks

Authors

  • Karanam M Dept. of Computer Science and Engineering, Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, Indi

Keywords:

Authentication, Secret Key, Cryptography, Private Key, Public Key

Abstract

Wireless sensor systems rearrange the gathering and investigation of information from numerous areas. Target tracking and edge interruption recognition applications are advantage from the specially appointed adhoc and self-association abilities of wireless sensor systems. Be that as it may, sensor systems conveyed in antagonistic situations must be strengthened against assaults by foes. This proposal inspects the limitations that make wireless sensor system observation testing and assesses calculations that give starting point respectability and information trustworthiness for wireless sensor systems. We propose another confirmation system. This performs superior to anything exiting strategies in terms of vitality utilization and deferral.

References

[1] Ismail Butun and Ravi Sankar.” Advanced Two Tier User

Authentication Scheme for Heterogeneous Wireless Sensor

Networks”. 2nd IEEE CCNC Research Student Workshop ,

2011.

[2] Sharma S., Kumar D. (2013) “Wireless Sensor Networks- A

Review on Topologies and Node Architecture”. International

Journal of Computer Sciences and Engineering. Vol.-1(2),

pp 19-25.

[3] Binod Vaidya, Jorge Sá Silva, Joel J. P. C. Rodrigues,2009.”

Robust Dynamic User Authentication Scheme for Wireless

Sensor Networks”proceeding of the 5th ACM symposium on

QOS and security for wireless and mobile networks.

[4] Omar Cheikhrouhou1,2, Anis Koubaa3,4, Manel Boujelbenl,

Mohamed Abid.” A Lightweight User Authentication

Scheme forWireless Sensor Networks” International

Conference on Sensor Networks, Ubiquitous, and

Trustworthy Computing, 2010.

[5] X. Du, G. Mohsen, X.O. Yang, C. Hsiao-Hwa. ”Two Tier

Secure Routing Protocol for Heterogeneous Sensor

Networks.” IEEE Transactions on Wireless

Communications, Vol.6 (9), pp. 3395-3401, September

2007,

[6] Panoat chuchaisri, Richard Newman,”Fast Response

PKCBased Broadcast AuthenticationinWireless Sensor

Networks”,COLLABORATECOM 2010. DOI

10.4108/icst.collaboratecom.2010.

[7] Rasmita Rautray, Itun Sarangi(2011),” A Survey On

Authentication Protocols For Wireless Sensor Network ”

International Journal of Engineering Science and

Technology (IJEST), ISSN : 0975-5462.

[8] Huei-ru Tseng, Rong-Hong Jan, Wuu Yang,”An Improved

Dynamic User Authentication Scheme for WSN” NSC 94-

2219-E-009-005.

[9] Er. Satish Kumar, "A Study of Wireless Sensor Networks- A

Review", International Journal of Computer Sciences and

Engineering, Volume-04, Issue-03, Page No (23-27), Mar -

2016, E-ISSN: 2347-2693

[10] Jibi Abraham and K S Ramanatha ,“An Efficient Protocol

for Authentication and Initial Shared key Establishment in

clustered WSN”, Proceeding of third International

conference on Wireless and optical Communication

networks 2006.

[11] Omar Cheikhrouhou, Anis Koubaa, Manel Boujelbenl,

Mohamed Abid 2010,” A lightweight user Authentication

Scheme for WSN” international Conference on Sensor

Networks,Ubiquitious, and Trustworthy Computing.

[12] Shamneesh Kumar, Dinesh Kumar and Keshav Kumar, “

Wireless Sensor Networks – A Review on Topologies and

Node Architecture”, pp 19-25, Vol 1, issue 2, October, 2013.

Downloads

Published

2016-05-31

How to Cite

[1]
M. Karanam, “Shared Secret Key with Random Value Authentication Scheme in Wireless Sensor Networks”, Int. J. Comp. Sci. Eng., vol. 4, no. 5, pp. 21–24, May 2016.

Issue

Section

Research Article