CFP last date
16 December 2024
Reseach Article

Literature Survey on Security techniques and Authentication Protocols for Wireless Sensor Networks

Published on November 2013 by Shifa S Sayyed, S R Jain
2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
Foundation of Computer Science USA
NCIPET - Number 2
November 2013
Authors: Shifa S Sayyed, S R Jain
2857760b-f1ff-4b77-bf4b-915f4a9f63d0

Shifa S Sayyed, S R Jain . Literature Survey on Security techniques and Authentication Protocols for Wireless Sensor Networks. 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013). NCIPET, 2 (November 2013), 0-0.

@article{
author = { Shifa S Sayyed, S R Jain },
title = { Literature Survey on Security techniques and Authentication Protocols for Wireless Sensor Networks },
journal = { 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013) },
issue_date = { November 2013 },
volume = { NCIPET },
number = { 2 },
month = { November },
year = { 2013 },
issn = 2249-0868,
pages = { 0-0 },
numpages = 1,
url = { /proceedings/ncipet/number2/555-1342/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%A Shifa S Sayyed
%A S R Jain
%T Literature Survey on Security techniques and Authentication Protocols for Wireless Sensor Networks
%J 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%@ 2249-0868
%V NCIPET
%N 2
%P 0-0
%D 2013
%I International Journal of Applied Information Systems
Abstract

Wireless sensor networks (WSNs) have gained attention Worldwide in recent years. Because of potential of physical isolation, these sensors have wide range of applications in land based security, military security and much more. As WSNs exchange there environmental conditions with each other, security become important aspect. In WSNs due to battery constraint problem, efficient secure and authentication algorithm is needed which take much lesser time to execution time. In this paper different authentication algorithms are introduced. Most of the literatures indicate that it is impossible to implement cryptographical algorithm because of its battery issue. Many symmetric and asymmetric algorithms have been implemented till yet with large keys. Some papers have provided different keys execution with time constraints.

References
  1. Garcia-Hernandez, C. F. , Ibarguengoytia-Gonzalez, P. H and Perez-DiaZo J. A 'Wireless Sensor Networks and Applications: A Survey', IJCSNS, 7(3),264-273 (2007)
  2. K . Saravana selvi T. "Rabin Public Key Cryptosystem for Mobile Authentication. ". IEEE- (ICAESM -2012) March 30, 31, 2012.
  3. Dr. Lawrence Washington. " Elliptic Curve Cryptography and Its Applications to Mobile Devices. " Wendy Chou, University of Maryland, College Park. Department of Mathematics.
  4. Dr. R. Shanmugalakshmi ,"Research Issues on Elliptic Curve Cryptography and Its applications - IJCSNS, VOL. 9 No. 6, June 2009,
  5. S. Z. S. Idrus,S. A. Aljunid,S. M. Asi, "Performance Analysis of Encryption Algorithms Text Length Size on Web Browsers," IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 1. January 2008
  6. S. Prasanna Ganesan " An Asymmetric Authentication Protocol for Mobile Devices Using HyperElliptic Curve Cryptography. " India. 2010 IEEE.
  7. Jian-zhu Lu and Jipeng Zhou" On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks. " 2010 IEEE.
  8. A Perrig, R Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Security cryptographic algorithm GPS Rabin public key cryptosystem Android SDK J Eclipse