Shared Secret Key with Random Value Authentication Scheme in Wireless Sensor Networks
Keywords:
Authentication, Secret Key, Cryptography, Private Key, Public KeyAbstract
Wireless sensor systems rearrange the gathering and investigation of information from numerous areas. Target tracking and edge interruption recognition applications are advantage from the specially appointed adhoc and self-association abilities of wireless sensor systems. Be that as it may, sensor systems conveyed in antagonistic situations must be strengthened against assaults by foes. This proposal inspects the limitations that make wireless sensor system observation testing and assesses calculations that give starting point respectability and information trustworthiness for wireless sensor systems. We propose another confirmation system. This performs superior to anything exiting strategies in terms of vitality utilization and deferral.
References
[1] Ismail Butun and Ravi Sankar.” Advanced Two Tier User
Authentication Scheme for Heterogeneous Wireless Sensor
Networks”. 2nd IEEE CCNC Research Student Workshop ,
2011.
[2] Sharma S., Kumar D. (2013) “Wireless Sensor Networks- A
Review on Topologies and Node Architecture”. International
Journal of Computer Sciences and Engineering. Vol.-1(2),
pp 19-25.
[3] Binod Vaidya, Jorge Sá Silva, Joel J. P. C. Rodrigues,2009.”
Robust Dynamic User Authentication Scheme for Wireless
Sensor Networks”proceeding of the 5th ACM symposium on
QOS and security for wireless and mobile networks.
[4] Omar Cheikhrouhou1,2, Anis Koubaa3,4, Manel Boujelbenl,
Mohamed Abid.” A Lightweight User Authentication
Scheme forWireless Sensor Networks” International
Conference on Sensor Networks, Ubiquitous, and
Trustworthy Computing, 2010.
[5] X. Du, G. Mohsen, X.O. Yang, C. Hsiao-Hwa. ”Two Tier
Secure Routing Protocol for Heterogeneous Sensor
Networks.” IEEE Transactions on Wireless
Communications, Vol.6 (9), pp. 3395-3401, September
2007,
[6] Panoat chuchaisri, Richard Newman,”Fast Response
PKCBased Broadcast AuthenticationinWireless Sensor
Networks”,COLLABORATECOM 2010. DOI
10.4108/icst.collaboratecom.2010.
[7] Rasmita Rautray, Itun Sarangi(2011),” A Survey On
Authentication Protocols For Wireless Sensor Network ”
International Journal of Engineering Science and
Technology (IJEST), ISSN : 0975-5462.
[8] Huei-ru Tseng, Rong-Hong Jan, Wuu Yang,”An Improved
Dynamic User Authentication Scheme for WSN” NSC 94-
2219-E-009-005.
[9] Er. Satish Kumar, "A Study of Wireless Sensor Networks- A
Review", International Journal of Computer Sciences and
Engineering, Volume-04, Issue-03, Page No (23-27), Mar -
2016, E-ISSN: 2347-2693
[10] Jibi Abraham and K S Ramanatha ,“An Efficient Protocol
for Authentication and Initial Shared key Establishment in
clustered WSN”, Proceeding of third International
conference on Wireless and optical Communication
networks 2006.
[11] Omar Cheikhrouhou, Anis Koubaa, Manel Boujelbenl,
Mohamed Abid 2010,” A lightweight user Authentication
Scheme for WSN” international Conference on Sensor
Networks,Ubiquitious, and Trustworthy Computing.
[12] Shamneesh Kumar, Dinesh Kumar and Keshav Kumar, “
Wireless Sensor Networks – A Review on Topologies and
Node Architecture”, pp 19-25, Vol 1, issue 2, October, 2013.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Karanam M

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
