Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 9, September 2017

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

In Wireless Sensor Network, when user wants to access the data at sensor node at that time user should be authorized. There are many malicious users in network. In previous systems, there are chances of many network attacks like node capture, stolen smart card attack, sensor node spoofing attack, stolen verifier attack, and fails to ensure backward secrecy. To overcome these attacks and to prevent our sensor, sensor data, and Network from malicious users, we proposed a secure, efficient, flexible Authentication Scheme for WSN.

Keywords: Ad hoc wireless sensor network, Smart card, Forward Secrecy, Oracles

Edition: Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Share this Article

How to Cite this Article?

Apurva J. Shastri, S. R. Tandle, "Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20176912, Volume 6 Issue 9, September 2017, 1588 - 1590

94 PDF Views | 88 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Smart card'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1441 - 1443

A Novel Approach on Multi Factor Authentication

Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2202 - 2204

Software License Authentication: A Smart Card Approach

Tadiboina Tarun, Shaik Nyamathulla

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1822 - 1825

Fraud Detection in Banking Sector using Data Mining

B. Rajdeepa, D. Nandhitha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 924 - 926

An Optimised Key cryptography for Securing Cloud Data Sharing and Storage Environment

Viharika Sudanagunta, K. Narayana Rao

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1087 - 1091

Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud

Kavitha K, Manjula R

Share this Article

Similar Articles with Keyword 'Forward Secrecy'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2314 - 2318

Cloud And Parallel Network File System Using Authenticated Key Exchange Protocols

Anupama T, Refeeda K

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1443 - 1446

A Survey on Authenticated Key Exchange Protocols Used for Accessing Storage Devices in Parallel Network File System

Anila P, Prajeesh C B

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 873 - 876

Analysis of Password based Multi-server Authentication Schemes

Swati Nema, Anamika Soni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2502 - 2506

Password Prestidigitation for Key Exchange Authentication Protocol

Anila P, Prajeesh C B

Share this Article

Similar Articles with Keyword 'Oracles'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1698 - 1704

Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation

V. Maruvoor Arasi, Carolene

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this Article
Top