Abstract

Wireless Sensor Networks (WSN) are major research area in the past few decades. WSN is formed by collection of sensor nodes. Power source life and memory size limit the hardware sources and these will decide the lifesapn of sensor nodes in WSN. Therefore, many resources based research issues are evolved in WSN. This study focused security issue and proposed authentication system. As the sensor nodes are limited memory, the traditional authentication systems are uncomforted. Hence, secret handshake system using two authorities, namely Issue Authority and Validate Authority are proposed in this study. The proposed authentication system is called as, Secret Handshake Issue and Validate Authority (SHIVA). The proposed methodology is occupying lesser memory space and also reducing number of communication of sensor nodes for the authentication model. Therefore, the proposed methodology proved optimum for WSN.

Highlights

  • The number of applications using Wireless Sensor Networks (WSN) is growing rapidly over the years

  • The proposed Secret Handshake Issue and Validate Authority (SHIVA) is compared with traditional Target Authority (TA) Model and Recent Mobile Agent (MA) model

  • SHIVA model is compared with traditional Target authority model and recent Mobile agent model

Read more

Summary

Introduction

The number of applications using WSN is growing rapidly over the years. protecting sensor nodesWSN become an ideal framework for monitoring the environment data through the collection of distributed collaborative sensor nodes. WSN consists of a large number of sensor nodes These will not have a centralised system but provided with self powered by a battery and they are capable of doing computation equipped with a processor and a communication module. These WSN find applications in monitoring meterological data. These are used in tracing targets in the battle field, border security. These networks are employed in detecting forest fire, monitoring health, habitat. The sensor nodes are limited resources and implementation of the security model is more critical in WSN, since sensor nodes must be provided with enough memory to retrieve the information stored in security keys (Xiaowang and Jianyong, 2011)

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call