Student Project | Computer Science & Engineering | India | Volume 10 Issue 5, May 2021
Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Wireless Sensor Networks (WSNs) consists of low cost, light weight, low processing power, shrinked life sensor nodes known as motes with an ability to communicate with each other over short ranges. The network formed out of sensor motes is controlled by a Base Station which has far more processing power and life as compared to sensor nodes. As WSNs are used for many practical purposes including matters related to na-tional security, it becomes imperative to ensure that the underlying communication is secured. However, the scarcity of resources in a sensor mote makes it highly challenging to ensure secured communication and long life of a sensor network at the same time. Several protocols have been proposed for authentication mechanisms in WSNs but most of them either are weak or have resulted in large energy expenditure. We through this paper have proposed a light weight protocol suite which has tried to cover almost all the authentication requirements of WSN. The proposed authentication protocol suite has been made light weighted by using symmetric encryption/decryption in most of the situations and the security has been made comparable to that of asymmetric encryption/decryption by introducing randomization in symmetric cryp-tosystem. We have proposed protocols for node authentication, broadcast authentication, data transfer and network monitoring using a combination of public key and symmetric cryptography. Previous works have been used for the calculation and comparison of energy expenditures in detail.
Keywords: Symmetric Key Cryptography, Randomisation, Wireless Sensor Node, Authentication Protocols, Energy Saving
Edition: Volume 10 Issue 5, May 2021
Pages: 475 - 485
How to Cite this Article?
Rahul K Drolia, "Light Weight WSN Authentication Protocol Suite", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=MR21501205141, Volume 10 Issue 5, May 2021, 475 - 485
Similar Articles with Keyword 'Symmetric Key Cryptography'
A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
Nirupama Devangaon, Dr Suvarna Nandyal
Similar Articles with Keyword 'Wireless Sensor Node'
Wireless Sensor Networks for Traffic Congestion Monitoring
Nitish R Chavan, Ravinarayana.B, Ravikumar.D
Survey on Fault Tolerant Localization and Tracking in WSN's using Binary Data
Chinmay Gordey, Vaishali Deshmukh
Similar Articles with Keyword 'Authentication Protocols'
Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
A Secure OTP Algorithm using Smartphone Application ? Proposed Approach
Sonal N. Pannase, P. R. Pardhi
Similar Articles with Keyword 'Energy Saving'
STOC: Energy Cost Models of Smartphones for Task Offloading to the Cloud
Rahitha K, Gireesh T K
Overview on Effective Controlling Via Store-Carry and Forward Scheme in Mobile Communication
Anusha Varghese, Dr. K Deeba
Similar Articles with Keyword 'Symmetric'
Key Management in Wireless Sensor Networks - A Review
Majida C V, Sandhya V
Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
Similar Articles with Keyword 'Key'
Survey on Algorithms Predicting Performance of Keyword Queries
Human Computer Interface for Physically Impaired
Aayush Bhansali, Shivani Vhatkar, Shamoil Arsiwala, Aditi Srivastava, M. K. Nivangune
Similar Articles with Keyword 'Cryptography'
A New Cryptography Algorithm Based on ASCII Code
Yaser M.A. Abualkas
Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni