Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

Literature Survey on Security techniques and Authentication Protocols for Wireless Sensor Networks

Shifa S Sayyed, S R Jain Published in Network Application

IJAIS Proceedings on 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
Year of Publication: 2013
© 2012 by IJAIS Journal
10.5120/ncipet1342
Download full text
  1. Shifa S Sayyed and S R Jain. Article: Literature Survey on Security techniques and Authentication Protocols for Wireless Sensor Networks. IJAIS Proceedings on 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013) NCIPET(2):4-7, November 2013. BibTeX

    @article{key:article,
    	author = "Shifa S Sayyed and S R Jain",
    	title = "Article: Literature Survey on Security techniques and Authentication Protocols for Wireless Sensor Networks",
    	journal = "IJAIS Proceedings on 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)",
    	year = 2013,
    	volume = "NCIPET",
    	number = 2,
    	pages = "4-7",
    	month = "November",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

Wireless sensor networks (WSNs) have gained attention Worldwide in recent years. Because of potential of physical isolation, these sensors have wide range of applications in land based security, military security and much more. As WSNs exchange there environmental conditions with each other, security become important aspect. In WSNs due to battery constraint problem, efficient secure and authentication algorithm is needed which take much lesser time to execution time. In this paper different authentication algorithms are introduced. Most of the literatures indicate that it is impossible to implement cryptographical algorithm because of its battery issue. Many symmetric and asymmetric algorithms have been implemented till yet with large keys. Some papers have provided different keys execution with time constraints.

Reference

  1. Garcia-Hernandez, C. F. , Ibarguengoytia-Gonzalez, P. H and Perez-DiaZo J. A 'Wireless Sensor Networks and Applications: A Survey', IJCSNS, 7(3),264-273 (2007)
  2. K . Saravana selvi T. "Rabin Public Key Cryptosystem for Mobile Authentication. ". IEEE- (ICAESM -2012) March 30, 31, 2012.
  3. Dr. Lawrence Washington. " Elliptic Curve Cryptography and Its Applications to Mobile Devices. " Wendy Chou, University of Maryland, College Park. Department of Mathematics.
  4. Dr. R. Shanmugalakshmi ,"Research Issues on Elliptic Curve Cryptography and Its applications - IJCSNS, VOL. 9 No. 6, June 2009,
  5. S. Z. S. Idrus,S. A. Aljunid,S. M. Asi, "Performance Analysis of Encryption Algorithms Text Length Size on Web Browsers," IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 1. January 2008
  6. S. Prasanna Ganesan " An Asymmetric Authentication Protocol for Mobile Devices Using HyperElliptic Curve Cryptography. " India. 2010 IEEE.
  7. Jian-zhu Lu and Jipeng Zhou" On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks. " 2010 IEEE.
  8. A Perrig, R Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.

Keywords

Security, cryptographic algorithm, GPS, Rabin public key cryptosystem, Android SDK, J Eclipse