International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 9, September 2017

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

In Wireless Sensor Network, when user wants to access the data at sensor node at that time user should be authorized. There are many malicious users in network. In previous systems, there are chances of many network attacks like node capture, stolen smart card attack, sensor node spoofing attack, stolen verifier attack, and fails to ensure backward secrecy. To overcome these attacks and to prevent our sensor, sensor data, and Network from malicious users, we proposed a secure, efficient, flexible Authentication Scheme for WSN.

Keywords: Ad hoc wireless sensor network, Smart card, Forward Secrecy, Oracles

Edition: Volume 6 Issue 9, September 2017

Pages: 1588 - 1590


How to Cite this Article?

Apurva J. Shastri, S. R. Tandle, "Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20176912, Volume 6 Issue 9, September 2017, 1588 - 1590

9 PDF Views | 13 PDF Downloads

Download Article PDF

Video Lecture of Above Article is Not Available Yet

You be the First to Request! Press the Button below!



Similar Articles with Keyword 'Smart card'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1822 - 1825

Fraud Detection in Banking Sector using Data Mining

B. Rajdeepa, D. Nandhitha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2202 - 2204

Software License Authentication: A Smart Card Approach

Tadiboina Tarun, Shaik Nyamathulla

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 873 - 876

Analysis of Password based Multi-server Authentication Schemes

Swati Nema, Anamika Soni

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1441 - 1443

A Novel Approach on Multi Factor Authentication

Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this article

Similar Articles with Keyword 'Forward Secrecy'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2314 - 2318

Cloud And Parallel Network File System Using Authenticated Key Exchange Protocols

Anupama T, Refeeda K

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1443 - 1446

A Survey on Authenticated Key Exchange Protocols Used for Accessing Storage Devices in Parallel Network File System

Anila P, Prajeesh C B

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 873 - 876

Analysis of Password based Multi-server Authentication Schemes

Swati Nema, Anamika Soni

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 2502 - 2506

Password Prestidigitation for Key Exchange Authentication Protocol

Anila P, Prajeesh C B

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this article

Similar Articles with Keyword 'Oracles'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1698 - 1704

Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation

V. Maruvoor Arasi, Carolene

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this article

Top