Academic Journals Database
Disseminating quality controlled scientific knowledge

Authentication Protocol against Malicious Attack in Wireless Sensor Networks: A Review

Author(s): Amit Kumar | Sunil Gupta | Rashmi Sharma

Journal: International Journal of Computer Applications
ISSN 0975-8887

Volume: 58;
Issue: 4;
Start page: 29;
Date: 2012;
Original page

Keywords: Authentication | Wireless Sensor Network | Smart Card | Security Attacks

Nodes in a sensor network may be lost due to malicious attack or either power loss. To extend the life time of the sensor network the novel Authentication Protocol is needed to overcome the internal attacks. In a defense scenario the advisory or intruder may directly deploy the malicious node or manipulate existing node to introduce malicious new node to the network. This paper focus on Novel Authentication Protocol to provide a security solution against known malicious attacks. It provides better authentication protocol for access control in the sensor network. We also emphasis on the confidentiality for the information access in between the sensor networks. In this paper we review secure WSN user Authentication Protocol and its several security weaknesses. According to our analysis of security our protocol as compare to security, computation and communication cost is scalable for application with higher security requirements. Our protocol is well designed for sensor nodes which typically have limited resources with better authentication procedure that use one way hash function and smart cards can be implemented efficiently.

Tango Rapperswil
Tango Rapperswil

RPA Switzerland

Robotic Process Automation Switzerland