Abstract: Light Weight WSN Authentication Protocol Suite
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 1

Student Project | Computer Science & Engineering | India | Volume 10 Issue 5, May 2021

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Wireless Sensor Networks (WSNs) consists of low cost, light weight, low processing power, shrinked life sensor nodes known as motes with an ability to communicate with each other over short ranges. The network formed out of sensor motes is controlled by a Base Station which has far more processing power and life as compared to sensor nodes. As WSNs are used for many practical purposes including matters related to na-tional security, it becomes imperative to ensure that the underlying communication is secured. However, the scarcity of resources in a sensor mote makes it highly challenging to ensure secured communication and long life of a sensor network at the same time. Several protocols have been proposed for authentication mechanisms in WSNs but most of them either are weak or have resulted in large energy expenditure. We through this paper have proposed a light weight protocol suite which has tried to cover almost all the authentication requirements of WSN. The proposed authentication protocol suite has been made light weighted by using symmetric encryption/decryption in most of the situations and the security has been made comparable to that of asymmetric encryption/decryption by introducing randomization in symmetric cryp-tosystem. We have proposed protocols for node authentication, broadcast authentication, data transfer and network monitoring using a combination of public key and symmetric cryptography. Previous works have been used for the calculation and comparison of energy expenditures in detail.

Keywords: Symmetric Key Cryptography, Randomisation, Wireless Sensor Node, Authentication Protocols, Energy Saving

Edition: Volume 10 Issue 5, May 2021

Pages: 475 - 485

Share this Article

How to Cite this Article?

Rahul K Drolia, "Light Weight WSN Authentication Protocol Suite", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=MR21501205141, Volume 10 Issue 5, May 2021, 475 - 485

Enter Your Email Address


Similar Articles with Keyword 'Symmetric Key Cryptography'

Downloads: 114

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 116

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1495 - 1500

Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Nirupama Devangaon, Dr Suvarna Nandyal

Share this Article

Similar Articles with Keyword 'Wireless Sensor Node'

Downloads: 95

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3170 - 3173

Wireless Sensor Networks for Traffic Congestion Monitoring

Nitish R Chavan, Ravinarayana.B, Ravikumar.D

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1597 - 1599

Survey on Fault Tolerant Localization and Tracking in WSN's using Binary Data

Chinmay Gordey, Vaishali Deshmukh

Share this Article

Similar Articles with Keyword 'Authentication Protocols'

Downloads: 106

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2234 - 2237

Analysis of Protective Mechanism in Roaming Network for Secure Communication

Ashwini A. Lokhande, Sonali U. Nimbhorkar

Share this Article

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 2199 - 2202

A Secure OTP Algorithm using Smartphone Application ? Proposed Approach

Sonal N. Pannase, P. R. Pardhi

Share this Article

Similar Articles with Keyword 'Energy Saving'

Downloads: 109

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2438 - 2441

STOC: Energy Cost Models of Smartphones for Task Offloading to the Cloud

Rahitha K, Gireesh T K

Share this Article

Downloads: 115

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2533 - 2535

Overview on Effective Controlling Via Store-Carry and Forward Scheme in Mobile Communication

Anusha Varghese, Dr. K Deeba

Share this Article

Similar Articles with Keyword 'Symmetric'

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Similar Articles with Keyword 'Key'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1017 - 1020

Human Computer Interface for Physically Impaired

Aayush Bhansali, Shivani Vhatkar, Shamoil Arsiwala, Aditi Srivastava, M. K. Nivangune

Share this Article

Similar Articles with Keyword 'Cryptography'

Downloads: 10 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 92

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article
Top