Cargando…

Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their...

Descripción completa

Detalles Bibliográficos
Autores principales: Rajeswari, S. Raja, Seenivasagam, V.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4737465/
https://www.ncbi.nlm.nih.gov/pubmed/26881272
http://dx.doi.org/10.1155/2016/6854303
_version_ 1782413484213927936
author Rajeswari, S. Raja
Seenivasagam, V.
author_facet Rajeswari, S. Raja
Seenivasagam, V.
author_sort Rajeswari, S. Raja
collection PubMed
description Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.
format Online
Article
Text
id pubmed-4737465
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-47374652016-02-15 Comparative Study on Various Authentication Protocols in Wireless Sensor Networks Rajeswari, S. Raja Seenivasagam, V. ScientificWorldJournal Review Article Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. Hindawi Publishing Corporation 2016 2016-01-13 /pmc/articles/PMC4737465/ /pubmed/26881272 http://dx.doi.org/10.1155/2016/6854303 Text en Copyright © 2016 S. R. Rajeswari and V. Seenivasagam. https://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Review Article
Rajeswari, S. Raja
Seenivasagam, V.
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
title Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
title_full Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
title_fullStr Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
title_full_unstemmed Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
title_short Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
title_sort comparative study on various authentication protocols in wireless sensor networks
topic Review Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4737465/
https://www.ncbi.nlm.nih.gov/pubmed/26881272
http://dx.doi.org/10.1155/2016/6854303
work_keys_str_mv AT rajeswarisraja comparativestudyonvariousauthenticationprotocolsinwirelesssensornetworks
AT seenivasagamv comparativestudyonvariousauthenticationprotocolsinwirelesssensornetworks