Authentication Techniques in Wireless Sensor Networks : A Survey

Journal Title: International Journal of Scientific Research and Management - Year 2015, Vol 3, Issue 2

Abstract

A wireless Sensor Network (WSN) consists of a large number of sensor nodes mostly deployed in places where monitoring thenodes is highly tougher. The most commonly used authentication techniques are public key cryptography or private keycryptography. In some networks a node will be selected as cluster head which will be communicating with the base stationthrough a trusted server, In such cases the nodes has to be authenticated to ensure the security. Authentication ensures the nodalsecurity in a network. In sensor networks, confidentiality, integrity, authenticity, non repudiation and compromise nod e a re mainfeatures to take care off . In this paper, t he various authentication techniques in Wireless Sensor Networks and its methodologies are discussed.

Authors and Affiliations

M. Mary Madura Selvam

Keywords

Related Articles

A Review Of Application Of GFRP In Shear And Flexure To Strengthen The Reinforced Concrete Beam

A numbers of research are being conducted for t he use of frp in the repair and strengthening of reinforced concrete member. Repair and strengtheni ng of concrete structure using such advanced...

The Promotion of Cultural Tourism in Lower Subansiri District of Arunachal Pradesh: An Evolution of Accommodation Facilities and Tourists Arrivals

The Lower Subansiri district is one of the oldest district of Arunachal Pradesh with an area of about 3460 sq.km and about 83,030 population (2011) spreading in 536 villages. Geographically, it is an undulating terrain,...

Understanding India’s Energy Sector: Players, Policy Framework and Challenges

Numerous policy reforms over the past 20 years have shifted India’s energy sector from a predominantly government - owned system towards one based on market principles, offering a more level playing field for both pub...

Optimizing Just - In - Time Inventory System for Resource Allocation in Plastic Manufacturing Industry in Nigeria

The study focused on optimizing Just - in - Time (JIT) Inventory Control System for Resource Allocation in the Plastic Manufacturing Industry with a focus on D ouble - Diamond Plastic Manufacturin...

Theoretical Framework of Customer Relationship Management : An Overview

Customer Relationship Management is a strategy or philosophy which provides a vision for the company to deal with the customers. The aspire of a customer relationship management strategy is to maximize profitable relatio...

Download PDF file
  • EP ID EP214688
  • DOI -
  • Views 79
  • Downloads 0

How To Cite

M. Mary Madura Selvam (2015). Authentication Techniques in Wireless Sensor Networks : A Survey. International Journal of Scientific Research and Management, 3(2), -. https://europub.co.uk./articles/-A-214688