Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 109 | Weekly Hits: ⮙4 | Monthly Hits: ⮙10

Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 9, September 2017

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

In Wireless Sensor Network, when user wants to access the data at sensor node at that time user should be authorized. There are many malicious users in network. In previous systems, there are chances of many network attacks like node capture, stolen smart card attack, sensor node spoofing attack, stolen verifier attack, and fails to ensure backward secrecy. To overcome these attacks and to prevent our sensor, sensor data, and Network from malicious users, we proposed a secure, efficient, flexible Authentication Scheme for WSN.

Keywords: Ad hoc wireless sensor network, Smart card, Forward Secrecy, Oracles

Edition: Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Share this Article

How to Cite this Article?

Apurva J. Shastri, S. R. Tandle, "Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20176912, Volume 6 Issue 9, September 2017, 1588 - 1590

Enter Your Registered Email Address





Similar Articles with Keyword 'Smart card'

Downloads: 107 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1087 - 1091

Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud

Kavitha K, Manjula R

Share this Article

Downloads: 108 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1441 - 1443

A Novel Approach on Multi Factor Authentication

Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C

Share this Article

Downloads: 109 | Weekly Hits: ⮙4 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this Article

Downloads: 111 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2202 - 2204

Software License Authentication: A Smart Card Approach

Tadiboina Tarun, Shaik Nyamathulla

Share this Article

Downloads: 112 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017

Pages: 1970 - 1974

An Efficient Trust Model for Online Application using 2-Factor Authentication and Token Based Authentication

Varsha Jotwani, Dr. Amit Dutta

Share this Article

Similar Articles with Keyword 'Forward Secrecy'

Downloads: 106 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2314 - 2318

Cloud And Parallel Network File System Using Authenticated Key Exchange Protocols

Anupama T, Refeeda K

Share this Article

Downloads: 109 | Weekly Hits: ⮙4 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this Article

Downloads: 111 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1443 - 1446

A Survey on Authenticated Key Exchange Protocols Used for Accessing Storage Devices in Parallel Network File System

Anila P, Prajeesh C B

Share this Article

Downloads: 115 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 873 - 876

Analysis of Password based Multi-server Authentication Schemes

Swati Nema, Anamika Soni

Share this Article

Downloads: 118 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2502 - 2506

Password Prestidigitation for Key Exchange Authentication Protocol

Anila P, Prajeesh C B

Share this Article

Similar Articles with Keyword 'Oracles'

Downloads: 108 | Weekly Hits: ⮙5 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1698 - 1704

Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation

V. Maruvoor Arasi, Carolene

Share this Article

Downloads: 109 | Weekly Hits: ⮙4 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this Article



Top