Abstract

Wireless Sensor Networks (WSNs) can be the most important solution for several problems, particularly in emergency cases. Software engineering security for WSN can confirm four goals including confidentiality, integrity, authentication, and availability. In this paper, an authentication method for WSN is proposed based on lightweight authentication and key management protocol as well as concepts of software engineering. Moreover, the interleaving process is added to the adopted protocol to improve the security side. The proposed method uses a Kath hashing in addition to salt and hash: the MD5 algorithm. This is to provide an allowance for the authentication of the added node to join the network. The proposed method is tested over different case studies and the obtained results show the superior performance for it in terms of processing the added nodes.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.