Literature Survey on Security techniques and Authentication Protocols for Wireless Sensor Networks
Shifa S Sayyed and S R Jain. Article: Literature Survey on Security techniques and Authentication Protocols for Wireless Sensor Networks. IJAIS Proceedings on 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013) NCIPET(2):4-7, November 2013. BibTeX
@article{key:article, author = "Shifa S Sayyed and S R Jain", title = "Article: Literature Survey on Security techniques and Authentication Protocols for Wireless Sensor Networks", journal = "IJAIS Proceedings on 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)", year = 2013, volume = "NCIPET", number = 2, pages = "4-7", month = "November", note = "Published by Foundation of Computer Science, New York, USA" }
Abstract
Wireless sensor networks (WSNs) have gained attention Worldwide in recent years. Because of potential of physical isolation, these sensors have wide range of applications in land based security, military security and much more. As WSNs exchange there environmental conditions with each other, security become important aspect. In WSNs due to battery constraint problem, efficient secure and authentication algorithm is needed which take much lesser time to execution time. In this paper different authentication algorithms are introduced. Most of the literatures indicate that it is impossible to implement cryptographical algorithm because of its battery issue. Many symmetric and asymmetric algorithms have been implemented till yet with large keys. Some papers have provided different keys execution with time constraints.
Reference
- Garcia-Hernandez, C. F. , Ibarguengoytia-Gonzalez, P. H and Perez-DiaZo J. A 'Wireless Sensor Networks and Applications: A Survey', IJCSNS, 7(3),264-273 (2007)
- K . Saravana selvi T. "Rabin Public Key Cryptosystem for Mobile Authentication. ". IEEE- (ICAESM -2012) March 30, 31, 2012.
- Dr. Lawrence Washington. " Elliptic Curve Cryptography and Its Applications to Mobile Devices. " Wendy Chou, University of Maryland, College Park. Department of Mathematics.
- Dr. R. Shanmugalakshmi ,"Research Issues on Elliptic Curve Cryptography and Its applications - IJCSNS, VOL. 9 No. 6, June 2009,
- S. Z. S. Idrus,S. A. Aljunid,S. M. Asi, "Performance Analysis of Encryption Algorithms Text Length Size on Web Browsers," IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 1. January 2008
- S. Prasanna Ganesan " An Asymmetric Authentication Protocol for Mobile Devices Using HyperElliptic Curve Cryptography. " India. 2010 IEEE.
- Jian-zhu Lu and Jipeng Zhou" On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks. " 2010 IEEE.
- A Perrig, R Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
Keywords
Security, cryptographic algorithm, GPS, Rabin public key cryptosystem, Android SDK, J Eclipse