Authentication Techniques in Wireless Sensor Networks : A Survey
Journal Title: International Journal of Scientific Research and Management - Year 2015, Vol 3, Issue 2
Abstract
A wireless Sensor Network (WSN) consists of a large number of sensor nodes mostly deployed in places where monitoring thenodes is highly tougher. The most commonly used authentication techniques are public key cryptography or private keycryptography. In some networks a node will be selected as cluster head which will be communicating with the base stationthrough a trusted server, In such cases the nodes has to be authenticated to ensure the security. Authentication ensures the nodalsecurity in a network. In sensor networks, confidentiality, integrity, authenticity, non repudiation and compromise nod e a re mainfeatures to take care off . In this paper, t he various authentication techniques in Wireless Sensor Networks and its methodologies are discussed.
Authors and Affiliations
M. Mary Madura Selvam
Face Recognition LBP Feature Extraction and PCA Techniques
Face recognition is one of the security methods in biometric system in world wide area. Different mathematical calculations are used to perform face recognition. In this paper, Linear Binary pattern is applied to the dif...
Influence o f Financing Infrastructure o n Implementation o f Health Care Projects i n Meru County , Kenya
Devolution of the healthcare function from the national government in Kenya to county governments is influenced by various socio - economic and political factors . In particular, the provision of health infrastructure fo...
Influence Of Web Security Decisions By Hci Models
Despite the fact that security conventions are designed to make PC correspondence secure, it is generally realized that there is potential for security breakdowns at the human - machine interface. This paper investigate...
Design, Planning, Machining, a nd Manufacturing Using Rapid Prototyping Technologies i n Modern Engineering
The term rapid prototyping (RP) refers to a class of technologies that are used to produce physical objects layer - by - layer directly from computer aided design (CAD) data. These techniques allow designers to produce t...
V ulvar Squam ous Cell Carcinoma In A Horse : A Case Report
Formalin fixed tumor mass from vulva of mare was received from TVCC, PGIVAS, Akola for histopathological examination and diagnosis. Clinical examination findings reported were large ulcerated, neoplastic mass located at...