Abstract
Majority of the applications demand confidentiality and integrity of the shared information using Wireless Sensor Networks (WSNs). Key management schemes are one of the core concepts that ensure the security of WSNs. Prior key management schemes failed to provide required security arrangements in WSNs. Authentication is the core parameters that assess the capability of the deployed sensor nodes in the communication fields. In this paper, we review the existing authentication protocols by stating its merits and demerits. It is observed that the need for a secure and efficient authentication protocol is still in demand, owing to the real issues like identity overheads, information retrieval and location mining. This paper will assist the upcoming researchers to have an insight into the significance of lightweight authentication protocols in WSNs.
Cite
CITATION STYLE
Shanthi*, G. V., & Sunitha, D. K. V. N. (2020). A Review of Protocols Design in Secure and Efficient Authentication in Wireless Sensor Networks. International Journal of Innovative Technology and Exploring Engineering, 9(9), 541–546. https://doi.org/10.35940/ijitee.i7205.079920
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.