Authentication Techniques in Wireless Sensor Networks : A Survey

Journal Title: International Journal of Scientific Research and Management - Year 2015, Vol 3, Issue 2

Abstract

A wireless Sensor Network (WSN) consists of a large number of sensor nodes mostly deployed in places where monitoring thenodes is highly tougher. The most commonly used authentication techniques are public key cryptography or private keycryptography. In some networks a node will be selected as cluster head which will be communicating with the base stationthrough a trusted server, In such cases the nodes has to be authenticated to ensure the security. Authentication ensures the nodalsecurity in a network. In sensor networks, confidentiality, integrity, authenticity, non repudiation and compromise nod e a re mainfeatures to take care off . In this paper, t he various authentication techniques in Wireless Sensor Networks and its methodologies are discussed.

Authors and Affiliations

M. Mary Madura Selvam

Keywords

Related Articles

Face Recognition LBP Feature Extraction and PCA Techniques

Face recognition is one of the security methods in biometric system in world wide area. Different mathematical calculations are used to perform face recognition. In this paper, Linear Binary pattern is applied to the dif...

Influence o f Financing Infrastructure o n Implementation o f Health Care Projects i n Meru County , Kenya

Devolution of the healthcare function from the national government in Kenya to county governments is influenced by various socio - economic and political factors . In particular, the provision of health infrastructure fo...

Influence Of Web Security Decisions By Hci Models

Despite the fact that security conventions are designed to make PC correspondence secure, it is generally realized that there is potential for security breakdowns at the human - machine interface. This paper investigate...

Design, Planning, Machining, a nd Manufacturing Using Rapid Prototyping Technologies i n Modern Engineering

The term rapid prototyping (RP) refers to a class of technologies that are used to produce physical objects layer - by - layer directly from computer aided design (CAD) data. These techniques allow designers to produce t...

V ulvar Squam ous Cell Carcinoma In A Horse : A Case Report

Formalin fixed tumor mass from vulva of mare was received from TVCC, PGIVAS, Akola for histopathological examination and diagnosis. Clinical examination findings reported were large ulcerated, neoplastic mass located at...

Download PDF file
  • EP ID EP214688
  • DOI -
  • Views 78
  • Downloads 0

How To Cite

M. Mary Madura Selvam (2015). Authentication Techniques in Wireless Sensor Networks : A Survey. International Journal of Scientific Research and Management, 3(2), -. https://europub.co.uk/articles/-A-214688