An Unified Approach by Implementing the Secured Authentication Protocol Scheme in Wireless Sensor Networks

R Sujatha, M Lawanya
2014 Review of Information Engineering and Applications  
Wireless Sensor Networks (WSN) is an ad-hoc mobile network and is highly vulnerable to attacks because, it consists of various resource-constrained devices and they communicate via wireless links. Security of group communication for large mobile wireless sensor network hinges on efficient authentication protocol scheme. Consequently, one of the most primary challenge, on endow with the security services in sensor nodes are key distribution. Secure communications in wireless sensor networks are
more » ... ritical. As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed with pair-wise keys, LOCK (Localized Combinatorial Keying) and Structured Graphs etc. Therefore, security with key distribution is a good factor considered in wireless sensor network communications. The only requirement for a user is to send information in a reliable manner to the destination; this will be provided only with the security. In this regard, a novel secured authentication protocol scheme with finger-print scheme provides full security and very good resilience is proposed. It also has low transaction overhead and reduced less space overhead. This novel method produces good improvements in the functionality of security. Contribution/ Originality This study is one of very few studies which have investigated in the area of Authentication in Wireless Sensor Networks. Major threats are viewed and addressed with the dynamic password system. With this dynamic methodology hacking of text-based password is not feasible. Wireless Sensor Networks provide a trouble-free, fiscal approach for the [1] exploitation of disseminated scrutinize and control devices, avoiding the exclusive retrofit necessary in wired systems. The interest towards wireless sensor networks is simply by thinking in an essential manner with a large number of miniature sensor self-powered nodes which acquire information and to detect special measures and communicate in a wireless trend, [2] with the goal of furnishing their processed data to a base station. A typical WSN consists of hundreds or even thousands of small and resource-constrained sensor nodes. These sensor nodes are distributed and organized in uncontrollable environment for the collection of security-sensitive information. Individual sensor nodes rely on multi-hop wireless communication to deliver the sensed data to a remote base station. In an essential WSN situation, resource limitation, wireless communication, security-sensitive data, irrepressible environment, and even distributed deployment are all vulnerabilities. These susceptible threats make WSNs suffer from an astonishing number of security threats. WSNs can only be used in the grave applications after the potential security threats are eliminated.
doi:10.18488/journal.79/2014.1.1/79.1.24.38 fatcat:wkzphubbnnh2nbrosyqwqhypsi