CFP last date
15 May 2024
Reseach Article

Multi Factor Authentication Protocols for a Secured Wsn

by R.jayamala, V.eswari, K.marimuthu
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 2 - Number 2
Year of Publication: 2012
Authors: R.jayamala, V.eswari, K.marimuthu
10.5120/ijais12-450274

R.jayamala, V.eswari, K.marimuthu . Multi Factor Authentication Protocols for a Secured Wsn. International Journal of Applied Information Systems. 2, 2 ( May 2012), 35-39. DOI=10.5120/ijais12-450274

@article{ 10.5120/ijais12-450274,
author = { R.jayamala, V.eswari, K.marimuthu },
title = { Multi Factor Authentication Protocols for a Secured Wsn },
journal = { International Journal of Applied Information Systems },
issue_date = { May 2012 },
volume = { 2 },
number = { 2 },
month = { May },
year = { 2012 },
issn = { 2249-0868 },
pages = { 35-39 },
numpages = {9},
url = { https://www.ijais.org/archives/volume2/number2/134-0274/ },
doi = { 10.5120/ijais12-450274 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:43:16.586038+05:30
%A R.jayamala
%A V.eswari
%A K.marimuthu
%T Multi Factor Authentication Protocols for a Secured Wsn
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 2
%N 2
%P 35-39
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

WSN is an embedded system with the network properties of self configuration, self healing, dynamic routing and multi hop communication and sensor nodes are scattered in sensor field. WSN is ubiquitous in nature but nodes have limited energy resources and memory constraints, the protocols designed for sensor networks should be energy efficient. Security access to the sensor networks is a critical part of the network administration; due to wide availability of services and high mobility of users the strongest authentication methods are needed and hence we propose four factor user authentication protocols for a secured network. This scheme is based on multi factor such as password, smart card and a user finger print, phone factor.

References
  1. . Manik Lal Das, Member, IEEE Two-Factor User Authentication in Wireless Sensor Networks "IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS", VOL. 8, NO. 3, MARCH 2009
  2. . "An Improved Two-Factor Authentication Protocol 2010" Zhengzhou, He'nan, China Second International Conference on MultiMedia and Information Technology
  3. . Hui-Feng Huang and Ya-Fen Chang Chun-Hung Liu "Enhancement of Two-Factor User Authentication in Wireless Sensor Networks" 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
  4. E. H. (Jr) Callaway, Wireless Sensor Networks, Architectures and Protocols. Auerbach Publications, 2003.
  5. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: security protocols for sensor networks," Wireless Networks, Vol. 8, No. 5, pp. 521-534, 2002.
  6. N. Sastry and D. Wagner, "Security considerations for IEEE 802. 15. 4 networks," in Proc. ACM Workshop Wireless Security, ACM Press, pp. 32-42, 2004.
  7. C. Karlof, N. Sastry, and D. Wagner, "TinySec: a link layer security architecture for wireless sensor networks," in Proc. International Conf. Embedded Networked Sensor Syst. , ACM Press, pp. 162-175, 2004.
  8. _ RSA SecureID, "Secure identity. " [Online] Available: http://www. rsa. com/node. aspx?id=1156
Index Terms

Computer Science
Information Sciences

Keywords

Secured Networks Password Authentication Smart Card User Finger Print Phone Factor Authentication