Abstract
Wireless sensor networks (WSNs) are ubiquitous technology for the growth of low cost and low power wireless technology. WSN is the collection of spatially distributed sensors for sensing the physical conditions and organizing the collected data. Sensor nodes have lesser transmission range with limited storage capabilities and energy resources. Routing protocols in WSN guarantee the reliable multi-hop communication from the source node to destination node. An Authentication process is carried out to identify the authorized user for secured routing. In existing authentication methods, key management schemes and hashing techniques were used for increasing the authentication and security level performance. However, the existing techniques failed to improve the authentication accuracy and reduce the authentication time with minimal energy consumption (EC) for secured data transmission in WSN. This paper studied the problem faced using existing authentication techniques in order to increase the security level.
Highlights
Security is an essential problem in Wireless sensor networks (WSNs) while routing the information from the source node to destination node
It is observed that the security level using certificate-less effective key management (CL-EKM) protocol is higher when compared to Active Trust (AT), provably secure pairing-free ID-based signature scheme and State space battery model
It is observed that the existing techniques failed to improve the performance of authentication accuracy and energy consumption
Summary
WSN comprises the number of small sensor nodes for broadcasting the information over wireless links. In [4], an effective key management protocol (CL-EKM) was introduced for secured routing. It is exploited for key updates while node leaves or joins a cluster. A new Linear Programming Framework was designed in [5] depending on the route energy cost for increasing the security level in WSN. An enhanced and efficient cluster-based security protocol was introduced in [7] for end-to-end data authentication with the digital signature and increased the efficiency through security analysis. An active detection secured routing scheme termed Active Trust (AT) was designed in [1] for WSNs. AT eradicates black holes for detect and achieves nodal trust for improving data formal proof and employed the protocol for the formal verification process. Antony Cynthia et al, International Journal of Advanced Research in Computer Science, 9 (2), March-April 2018,668-674
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Research in Computer Science
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.