2016
DOI: 10.1155/2016/6854303
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 49 publications
0
15
0
1
Order By: Relevance
“…The vulnerability of WSNs to various security attacks makes it challenging to use it in several applications. An efficient authentication mechanism can avoid most of the security attacks, establish secure communication between nodes, and secure the sensitive data, although many mechanisms 2 have been designed for authentication of nodes in WSNs. These mechanisms are inadequate due to the resource constraint nature of sensor nodes.…”
Section: Related Workmentioning
confidence: 99%
“…The vulnerability of WSNs to various security attacks makes it challenging to use it in several applications. An efficient authentication mechanism can avoid most of the security attacks, establish secure communication between nodes, and secure the sensitive data, although many mechanisms 2 have been designed for authentication of nodes in WSNs. These mechanisms are inadequate due to the resource constraint nature of sensor nodes.…”
Section: Related Workmentioning
confidence: 99%
“…We analyzed primary sources on the security of sensor networks and identified the most common types of attacks [29][30][31][32]. We have distributed these attacks to the levels of the standard OSI model.…”
Section: Sensor Network Securitymentioning
confidence: 99%
“…Implements one reception kind of thing which validates message and resource of sensor node for protecting an authentication from DoS attack [9]. Implements Identity based authentication scheme for heterogeneous environment using virtual IPv6 address for authentication of device and gateways.…”
Section: IVmentioning
confidence: 99%