z-logo
open-access-imgOpen Access
User Authentication Techniques for Wireless Sensor Networks : A Survey
Author(s) -
Shakera Shaikh,
Veena Gulhane,
G. H. Raisoni
Publication year - 2012
Publication title -
international journal of smart sensors and ad hoc networks
Language(s) - English
Resource type - Journals
ISSN - 2248-9738
DOI - 10.47893/ijssan.2012.1142
Subject(s) - wireless sensor network , computer network , computer science , authentication (law) , key distribution in wireless sensor networks , sensor node , confidentiality , mobile wireless sensor network , base station , wireless network , node (physics) , sensor web , wireless wan , wireless , computer security , engineering , telecommunications , structural engineering
A wireless sensor network(WSN) consisting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments. The data collected by each sensor node is communicated to the base station, which forwards the data to the end user. In wireless sensor network data security plays an important role where confidentiality, authentication, integrity, non repudiation are given importance. This paper synthesizes existing user authentication schemes in wireless sensor networks andhighlights the challenges in user authentication.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here