Shared Secret Key with Random Value Authentication Scheme in Wireless Sensor Networks
Madhavi Karanam1
Section:Research Paper, Product Type: Journal Paper
Volume-4 ,
Issue-5 , Page no. 21-24, May-2016
Online published on May 31, 2016
Copyright © Madhavi Karanam . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Madhavi Karanam, “Shared Secret Key with Random Value Authentication Scheme in Wireless Sensor Networks,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.21-24, 2016.
MLA Style Citation: Madhavi Karanam "Shared Secret Key with Random Value Authentication Scheme in Wireless Sensor Networks." International Journal of Computer Sciences and Engineering 4.5 (2016): 21-24.
APA Style Citation: Madhavi Karanam, (2016). Shared Secret Key with Random Value Authentication Scheme in Wireless Sensor Networks. International Journal of Computer Sciences and Engineering, 4(5), 21-24.
BibTex Style Citation:
@article{Karanam_2016,
author = {Madhavi Karanam},
title = {Shared Secret Key with Random Value Authentication Scheme in Wireless Sensor Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2016},
volume = {4},
Issue = {5},
month = {5},
year = {2016},
issn = {2347-2693},
pages = {21-24},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=896},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=896
TI - Shared Secret Key with Random Value Authentication Scheme in Wireless Sensor Networks
T2 - International Journal of Computer Sciences and Engineering
AU - Madhavi Karanam
PY - 2016
DA - 2016/05/31
PB - IJCSE, Indore, INDIA
SP - 21-24
IS - 5
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
2135 | 1672 downloads | 1572 downloads |
Abstract
Wireless sensor systems rearrange the gathering and investigation of information from numerous areas. Target tracking and edge interruption recognition applications are advantage from the specially appointed adhoc and self-association abilities of wireless sensor systems. Be that as it may, sensor systems conveyed in antagonistic situations must be strengthened against assaults by foes. This proposal inspects the limitations that make wireless sensor system observation testing and assesses calculations that give starting point respectability and information trustworthiness for wireless sensor systems. We propose another confirmation system. This performs superior to anything exiting strategies in terms of vitality utilization and deferral.
Key-Words / Index Term
Authentication, Secret Key, Cryptography, Private Key, Public Key
References
[1] Ismail Butun and Ravi Sankar.” Advanced Two Tier User Authentication Scheme for Heterogeneous Wireless Sensor Networks”. 2nd IEEE CCNC Research Student Workshop , 2011.
[2] Sharma S., Kumar D. (2013) “Wireless Sensor Networks- A Review on Topologies and Node Architecture”. International Journal of Computer Sciences and Engineering. Vol.-1(2), pp 19-25.
[3] Binod Vaidya, Jorge Sá Silva, Joel J. P. C. Rodrigues,2009.” Robust Dynamic User Authentication Scheme for Wireless Sensor Networks”proceeding of the 5th ACM symposium on QOS and security for wireless and mobile networks.
[4] Omar Cheikhrouhou1,2, Anis Koubaa3,4, Manel Boujelbenl, Mohamed Abid.” A Lightweight User Authentication Scheme forWireless Sensor Networks” International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2010.
[5] X. Du, G. Mohsen, X.O. Yang, C. Hsiao-Hwa. ”Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks.” IEEE Transactions on Wireless Communications, Vol.6 (9), pp. 3395-3401, September 2007,
[6] Panoat chuchaisri, Richard Newman,”Fast Response PKCBased Broadcast Authenticationin Wireless Sensor Networks”, COLLABORATECOM 2010. DOI 10.4108/icst.collaboratecom.2010.
[7] Rasmita Rautray, Itun Sarangi(2011),” A Survey On Authentication Protocols For Wireless Sensor Network ” International Journal of Engineering Science and Technology (IJEST), ISSN : 0975-5462.
[8] Huei-ru Tseng, Rong-Hong Jan, Wuu Yang,”An Improved Dynamic User Authentication Scheme for WSN” NSC 94- 2219-E-009-005.
[9] Er. Satish Kumar, "A Study of Wireless Sensor Networks- A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-03, Page No (23-27), Mar -2016, E-ISSN: 2347-2693
[10] Jibi Abraham and K S Ramanatha ,“An Efficient Protocol for Authentication and Initial Shared key Establishment in clustered WSN”, Proceeding of third International conference on Wireless and optical Communication networks 2006.
[11] Omar Cheikhrouhou, Anis Koubaa, Manel Boujelbenl, Mohamed Abid 2010,” A lightweight user Authentication Scheme for WSN” international Conference on Sensor Networks,Ubiquitious, and Trustworthy Computing.
[12] Shamneesh Kumar, Dinesh Kumar and Keshav Kumar, “ Wireless Sensor Networks – A Review on Topologies and Node Architecture”, pp 19-25, Vol 1, issue 2, October, 2013.