scispace - formally typeset
Proceedings ArticleDOI

A Lightweight And Secure Authentication Protocol for WSN.

Reads0
Chats0
TLDR
There is a need for a lightweight and secure authentication protocol for WSNs, where the sensors used in WSN are designed for low power environments, and longevity and hence do not possess these hardware resources to secure the communication.
Abstract
Wireless sensor networks (WSNs) are gaining traction in day to day applications where data has to be gathered in hostile environments using low computing power sensors. As these sensors are deployed in hostile environments, strong authentication mechanisms are essential to guarantee the safety and security of the data being transferred. But, these strong authentication mechanisms are computationally heavy for the low power sensors. So, there is a need for a lightweight and secure authentication protocol for WSNs. Applications of these sensor ranges from healthcare to oil and exploration. The security of the data being gathered and transmitted is of utmost importance as they can correlate to life and death situations in some instances. So, employment of extremely secure schemes is a necessity but all these schemes are computationally very expensive and require powerful hardware. The sensors used in WSN are designed for low power environments, and longevity and hence do not possess these hardware resources to secure the communication. Hardware-level, as well as lightweight operations, have to employ for securing the communication. This procedure also preserves the integrity of data being gathered and transmitted by the sensor through these WSNs.

read more

Citations
More filters
Journal ArticleDOI

Security and Threats of RFID and WSNs: Comparative Study

TL;DR: A comparative study to analyze the difference between two technologies—Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID) and provides a different way of detecting varying attacks in RFID and WSNs.
Journal ArticleDOI

Improvement of salp swarm algorithm (SSA2) for intelligent fault detection in smart wireless sensor networks

TL;DR: In this article, a new improvement of the salp swarm algorithm (SSA) is presented, called SSA2, which is taken from the behavior of salp fishes and enables the ability to monitor and track any fault that may be occurring.
Book ChapterDOI

Two-State Hybrid Learning Approaches for Energy Reduction Estimation on Wireless Sensor Networks

TL;DR: In this article , a design model for the WSN network based on optimized link states modeling to identify the specific nodes where the energy minimum has been established is presented, where the generated energy estimations where each set of established relay points ensures energy minimum improvising the parametric criteria on energy will be dealt with the design factors that govern the learning model.
Journal ArticleDOI

An Improved Biometric Based User Authentication and Key Agreement Scheme for Intelligent Sensor based Wireless Communication

TL;DR: In this article , the authors proposed a Biometric based User Authentication and Key Agreement Protocol (BUAKA) that uses a fuzzy extractor and one-way hash functions for sensor nodes authentication.
References
More filters
Journal ArticleDOI

A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

TL;DR: This work found that Turkanovic et al.'s smart card-based authentication scheme is vulnerable to impersonation attack with node capture, stolen smart card attack, sensor node spoofing attack, stolen verifier attack, and fails to ensure backward secrecy.
Journal ArticleDOI

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

TL;DR: This paper proposes a cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks that can provide stronger security protection of private information than most of existing schemes in insecure channel.
Journal ArticleDOI

A lightweight multi-layer authentication protocol for wireless body area networks

TL;DR: A one-to-many group authentication protocol and a group key establishment algorithm between personal digital assistance (PDA) and each of sensor nodes with energy efficiency and low computational cost and the validation of the proposed protocol can be proved.
Journal ArticleDOI

Anonymous and Traceable Group Data Sharing in Cloud Computing

TL;DR: This paper focuses on enabling data sharing and storage for the same group in the cloud with high security and efficiency in an anonymous manner by leveraging the key agreement and the group signature to support anonymous multiple users in public clouds.
Journal ArticleDOI

A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks

TL;DR: This paper demonstrates that the existing solutions for anonymous user authentication in WSN are impractical, and proposes a realistic authentication protocol for WSN, which can ensure various imperative security properties like user anonymity, untraceability, forward/backward secrecy, perfect forward secrecy, etc.
Related Papers (5)