Abstract
Wireless Sensor Networks (WSN) are major research area in the past few decades. WSN is formed by collection of sensor nodes. Power source life and memory size limit the hardware sources and these will decide the lifesapn of sensor nodes in WSN. Therefore, many resources based research issues are evolved in WSN. This study focused security issue and proposed authentication system. As the sensor nodes are limited memory, the traditional authentication systems are uncomforted. Hence, secret handshake system using two authorities, namely Issue Authority and Validate Authority are proposed in this study. The proposed authentication system is called as, Secret Handshake Issue and Validate Authority (SHIVA). The proposed methodology is occupying lesser memory space and also reducing number of communication of sensor nodes for the authentication model. Therefore, the proposed methodology proved optimum for WSN.
Highlights
The number of applications using Wireless Sensor Networks (WSN) is growing rapidly over the years
The proposed Secret Handshake Issue and Validate Authority (SHIVA) is compared with traditional Target Authority (TA) Model and Recent Mobile Agent (MA) model
SHIVA model is compared with traditional Target authority model and recent Mobile agent model
Summary
The number of applications using WSN is growing rapidly over the years. protecting sensor nodesWSN become an ideal framework for monitoring the environment data through the collection of distributed collaborative sensor nodes. WSN consists of a large number of sensor nodes These will not have a centralised system but provided with self powered by a battery and they are capable of doing computation equipped with a processor and a communication module. These WSN find applications in monitoring meterological data. These are used in tracing targets in the battle field, border security. These networks are employed in detecting forest fire, monitoring health, habitat. The sensor nodes are limited resources and implementation of the security model is more critical in WSN, since sensor nodes must be provided with enough memory to retrieve the information stored in security keys (Xiaowang and Jianyong, 2011)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have