Cargando…
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4737465/ https://www.ncbi.nlm.nih.gov/pubmed/26881272 http://dx.doi.org/10.1155/2016/6854303 |
_version_ | 1782413484213927936 |
---|---|
author | Rajeswari, S. Raja Seenivasagam, V. |
author_facet | Rajeswari, S. Raja Seenivasagam, V. |
author_sort | Rajeswari, S. Raja |
collection | PubMed |
description | Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. |
format | Online Article Text |
id | pubmed-4737465 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-47374652016-02-15 Comparative Study on Various Authentication Protocols in Wireless Sensor Networks Rajeswari, S. Raja Seenivasagam, V. ScientificWorldJournal Review Article Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. Hindawi Publishing Corporation 2016 2016-01-13 /pmc/articles/PMC4737465/ /pubmed/26881272 http://dx.doi.org/10.1155/2016/6854303 Text en Copyright © 2016 S. R. Rajeswari and V. Seenivasagam. https://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Review Article Rajeswari, S. Raja Seenivasagam, V. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks |
title | Comparative Study on Various Authentication Protocols in Wireless Sensor Networks |
title_full | Comparative Study on Various Authentication Protocols in Wireless Sensor Networks |
title_fullStr | Comparative Study on Various Authentication Protocols in Wireless Sensor Networks |
title_full_unstemmed | Comparative Study on Various Authentication Protocols in Wireless Sensor Networks |
title_short | Comparative Study on Various Authentication Protocols in Wireless Sensor Networks |
title_sort | comparative study on various authentication protocols in wireless sensor networks |
topic | Review Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4737465/ https://www.ncbi.nlm.nih.gov/pubmed/26881272 http://dx.doi.org/10.1155/2016/6854303 |
work_keys_str_mv | AT rajeswarisraja comparativestudyonvariousauthenticationprotocolsinwirelesssensornetworks AT seenivasagamv comparativestudyonvariousauthenticationprotocolsinwirelesssensornetworks |