International Journal of Smart Sensor and Adhoc Network IJSSAN

ISSN: 2248-9738

ijcct journal

Abstracting and Indexing

Crossref logo
IIMT Bhubaneswar

IJSSAN

User Authentication Techniques for Wireless Sensor Networks : A Survey


Shakera Shaikh
Computer Science & Engineering, G. H. Raisoni College of Engineering, Nagpur, India

Veena Gulhane
Computer Science & Engineering, G. H. Raisoni College of Engineering, Nagpur, India


Abstract

A wireless sensor network(WSN) consisiting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments.The data collected by each sensor node is communicated to the base station,which forwards the data to the end user. In wireless sensor network data security plays an important role where confidentiality, authentication, integrity, non repudiation are given importance.This paper synthesizes existing user authentication schemes in wirelss sensor networks and highlights the challenges in user authentication.

Recommended Citation

[1] Ismail Butun and Ravi Sankar,2011.” Advanced Two Tier User Authentication Scheme for Heterogeneous Wireless Sensor Networks”. 2nd IEEE CCNC Research Student Workshop. [2] X.H. Le, S. Lee, and Y.K. Lee. ”Two-Tier User Authentication Scheme for Heterogeneous Sensor Networks.” the 5th IEEE International Conference on Distributed Computing in Sensor Systems, (DCOSS ’09), Marina Del Rey, California, USA, June 8-10, 2009. [3] K.H.M. Wong, Y. Zheng, J. Cao, and S. Wang. ”A dynamic user authentication scheme for wireless sensor networks.” IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006. [4] Binod Vaidya, Jorge Sá Silva, Joel J. P. C. Rodrigues,2009.” Robust Dynamic User Authentication Scheme for Wireless Sensor Networks”proceeding of the 5th ACM symposium on QOS and security for wireless and mobile networks. [5] Omar Cheikhrouhou1,2, Anis Koubaa3,4, Manel Boujelbenl, Mohamed Abid1,2010.” A Lightweight User Authentication Scheme forWireless Sensor Networks” International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. [6] C. Jiang, B. Li, and H. Xu, “An efficient scheme for user authentication in wireless sensor networks” in 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007 [7] X. Du, G. Mohsen, X.O. Yang, C. Hsiao-Hwa. ”Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks.” IEEE Transactions on Wireless Communications, Vol.6 (9), September 2007, pp. 3395-3401. 

Download pdf viewer for your browser, if the PDF cannot be displayed.