International Journal of Smart Sensor and Adhoc Network IJSSAN
ISSN: 2248-9738
Abstracting and Indexing
IJSSAN
User Authentication Techniques for Wireless Sensor Networks : A Survey
Shakera Shaikh
Computer Science & Engineering, G. H. Raisoni College of Engineering, Nagpur, India
Veena Gulhane
Computer Science & Engineering, G. H. Raisoni College of Engineering, Nagpur, India
Abstract
A wireless sensor network(WSN) consisiting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments.The data collected by each sensor node is communicated to the base station,which forwards the data to the end user. In wireless sensor network data security plays an important role where confidentiality, authentication, integrity, non repudiation are given importance.This paper synthesizes existing user authentication schemes in wirelss sensor networks and highlights the challenges in user authentication.
Recommended Citation
[1] Ismail Butun and Ravi Sankar,2011.” Advanced Two Tier User Authentication Scheme for Heterogeneous Wireless Sensor Networks”. 2nd IEEE CCNC Research Student Workshop. [2] X.H. Le, S. Lee, and Y.K. Lee. ”Two-Tier User Authentication Scheme for Heterogeneous Sensor Networks.” the 5th IEEE International Conference on Distributed Computing in Sensor Systems, (DCOSS ’09), Marina Del Rey, California, USA, June 8-10, 2009. [3] K.H.M. Wong, Y. Zheng, J. Cao, and S. Wang. ”A dynamic user authentication scheme for wireless sensor networks.” IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006. [4] Binod Vaidya, Jorge Sá Silva, Joel J. P. C. Rodrigues,2009.” Robust Dynamic User Authentication Scheme for Wireless Sensor Networks”proceeding of the 5th ACM symposium on QOS and security for wireless and mobile networks. [5] Omar Cheikhrouhou1,2, Anis Koubaa3,4, Manel Boujelbenl, Mohamed Abid1,2010.” A Lightweight User Authentication Scheme forWireless Sensor Networks” International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. [6] C. Jiang, B. Li, and H. Xu, “An efficient scheme for user authentication in wireless sensor networks” in 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007 [7] X. Du, G. Mohsen, X.O. Yang, C. Hsiao-Hwa. ”Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks.” IEEE Transactions on Wireless Communications, Vol.6 (9), September 2007, pp. 3395-3401.