IDEAS home Printed from https://ideas.repec.org/a/pkp/roieaa/v1y2014i1p24-38id2660.html
   My bibliography  Save this article

An Unified Approach by Implementing the Secured Authentication Protocol Scheme in Wireless Sensor Networks

Author

Listed:
  • R Sujatha
  • M Lawanya

Abstract

Wireless Sensor Networks (WSN) is an ad-hoc mobile network and is highly vulnerable to attacks because, it consists of various resource-constrained devices and they communicate via wireless links. Security of group communication for large mobile wireless sensor network hinges on efficient authentication protocol scheme. Consequently, one of the most primary challenge, on endow with the security services in sensor nodes are key distribution. Secure communications in wireless sensor networks are critical. As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed with pair-wise keys, LOCK (Localized Combinatorial Keying) and Structured Graphs etc. Therefore, security with key distribution is a good factor considered in wireless sensor network communications. The only requirement for a user is to send information in a reliable manner to the destination; this will be provided only with the security. In this regard, a novel secured authentication protocol scheme with finger-print scheme provides full security and very good resilience is proposed. It also has low transaction overhead and reduced less space overhead. This novel method produces good improvements in the functionality of security.

Suggested Citation

  • R Sujatha & M Lawanya, 2014. "An Unified Approach by Implementing the Secured Authentication Protocol Scheme in Wireless Sensor Networks," Review of Information Engineering and Applications, Conscientia Beam, vol. 1(1), pages 24-38.
  • Handle: RePEc:pkp:roieaa:v:1:y:2014:i:1:p:24-38:id:2660
    as

    Download full text from publisher

    File URL: https://archive.conscientiabeam.com/index.php/79/article/view/2660/4136
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pkp:roieaa:v:1:y:2014:i:1:p:24-38:id:2660. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Dim Michael (email available below). General contact details of provider: https://archive.conscientiabeam.com/index.php/79/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.