z-logo
open-access-imgOpen Access
A Review of Protocols Design in Secure and Efficient Authentication in Wireless Sensor Networks
Author(s) -
G. Shanthi,
Dr K.V.N. Sunitha
Publication year - 2020
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.i7205.079920
Subject(s) - authentication (law) , computer science , wireless sensor network , authentication protocol , computer network , computer security , key (lock) , lightweight extensible authentication protocol , key management , protocol (science) , confidentiality , key distribution in wireless sensor networks , wireless , cryptography , wireless network , telecommunications , medicine , alternative medicine , pathology
Majority of the applications demand confidentiality and integrity of the shared information using Wireless Sensor Networks (WSNs). Key management schemes are one of the core concepts that ensure the security of WSNs. Prior key management schemes failed to provide required security arrangements in WSNs. Authentication is the core parameters that assess the capability of the deployed sensor nodes in the communication fields. In this paper, we review the existing authentication protocols by stating its merits and demerits. It is observed that the need for a secure and efficient authentication protocol is still in demand, owing to the real issues like identity overheads, information retrieval and location mining. This paper will assist the upcoming researchers to have an insight into the significance of lightweight authentication protocols in WSNs.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here