Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

Multi Factor Authentication Protocols for a Secured WSN

R. Jayamala, V. Eswari, K. Marimuthu Published in

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
10.5120/ijais12-450274
Download full text
  1. R.jayamala, V.eswari and K.marimuthu. Article: Multi Factor Authentication Protocols for a Secured Wsn. International Journal of Applied Information Systems 2(2):35-39, May 2012. BibTeX

    @article{key:article,
    	author = "R.jayamala and V.eswari and K.marimuthu",
    	title = "Article: Multi Factor Authentication Protocols for a Secured Wsn",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 2,
    	number = 2,
    	pages = "35-39",
    	month = "May",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

WSN is an embedded system with the network properties of self configuration, self healing, dynamic routing and multi hop communication and sensor nodes are scattered in sensor field. WSN is ubiquitous in nature but nodes have limited energy resources and memory constraints, the protocols designed for sensor networks should be energy efficient. Security access to the sensor networks is a critical part of the network administration; due to wide availability of services and high mobility of users the strongest authentication methods are needed and hence we propose four factor user authentication protocols for a secured network. This scheme is based on multi factor such as password, smart card and a user finger print, phone factor.

Reference

  1. . Manik Lal Das, Member, IEEE Two-Factor User Authentication in Wireless Sensor Networks "IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS", VOL. 8, NO. 3, MARCH 2009
  2. . "An Improved Two-Factor Authentication Protocol 2010" Zhengzhou, He'nan, China Second International Conference on MultiMedia and Information Technology
  3. . Hui-Feng Huang and Ya-Fen Chang Chun-Hung Liu "Enhancement of Two-Factor User Authentication in Wireless Sensor Networks" 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
  4. E. H. (Jr) Callaway, Wireless Sensor Networks, Architectures and Protocols. Auerbach Publications, 2003.
  5. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: security protocols for sensor networks," Wireless Networks, Vol. 8, No. 5, pp. 521-534, 2002.
  6. N. Sastry and D. Wagner, "Security considerations for IEEE 802. 15. 4 networks," in Proc. ACM Workshop Wireless Security, ACM Press, pp. 32-42, 2004.
  7. C. Karlof, N. Sastry, and D. Wagner, "TinySec: a link layer security architecture for wireless sensor networks," in Proc. International Conf. Embedded Networked Sensor Syst. , ACM Press, pp. 162-175, 2004.
  8. _ RSA SecureID, "Secure identity. " [Online] Available: http://www. rsa. com/node. aspx?id=1156

Keywords

Secured Networks, Password, Authentication, Smart Card, User Finger Print, Phone Factor Authentication