Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 9, September 2017
Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
Apurva J. Shastri, S. R. Tandle
In Wireless Sensor Network, when user wants to access the data at sensor node at that time user should be authorized. There are many malicious users in network. In previous systems, there are chances of many network attacks like node capture, stolen smart card attack, sensor node spoofing attack, stolen verifier attack, and fails to ensure backward secrecy. To overcome these attacks and to prevent our sensor, sensor data, and Network from malicious users, we proposed a secure, efficient, flexible Authentication Scheme for WSN.
Keywords: Ad hoc wireless sensor network, Smart card, Forward Secrecy, Oracles
Edition: Volume 6 Issue 9, September 2017
Pages: 1588 - 1590
How to Cite this Article?
Apurva J. Shastri, S. R. Tandle, "Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20176912, Volume 6 Issue 9, September 2017, 1588 - 1590
94 PDF Views | 88 PDF Downloads
Similar Articles with Keyword 'Smart card'
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1441 - 1443A Novel Approach on Multi Factor Authentication
Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2202 - 2204Software License Authentication: A Smart Card Approach
Tadiboina Tarun, Shaik Nyamathulla
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1822 - 1825Fraud Detection in Banking Sector using Data Mining
B. Rajdeepa, D. Nandhitha
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 924 - 926An Optimised Key cryptography for Securing Cloud Data Sharing and Storage Environment
Viharika Sudanagunta, K. Narayana Rao
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1087 - 1091Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud
Kavitha K, Manjula R
Similar Articles with Keyword 'Forward Secrecy'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2314 - 2318Cloud And Parallel Network File System Using Authenticated Key Exchange Protocols
Anupama T, Refeeda K
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017
Pages: 1588 - 1590Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
Apurva J. Shastri, S. R. Tandle
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 1443 - 1446A Survey on Authenticated Key Exchange Protocols Used for Accessing Storage Devices in Parallel Network File System
Anila P, Prajeesh C B
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 873 - 876Analysis of Password based Multi-server Authentication Schemes
Swati Nema, Anamika Soni
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017
Pages: 2502 - 2506Password Prestidigitation for Key Exchange Authentication Protocol
Anila P, Prajeesh C B
Similar Articles with Keyword 'Oracles'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1698 - 1704Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation
V. Maruvoor Arasi, Carolene
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017
Pages: 1588 - 1590Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
Apurva J. Shastri, S. R. Tandle