A Review of Protocols Design in Secure and Efficient Authentication in Wireless Sensor Networks

  • Shanthi* G
  • et al.
N/ACitations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Majority of the applications demand confidentiality and integrity of the shared information using Wireless Sensor Networks (WSNs). Key management schemes are one of the core concepts that ensure the security of WSNs. Prior key management schemes failed to provide required security arrangements in WSNs. Authentication is the core parameters that assess the capability of the deployed sensor nodes in the communication fields. In this paper, we review the existing authentication protocols by stating its merits and demerits. It is observed that the need for a secure and efficient authentication protocol is still in demand, owing to the real issues like identity overheads, information retrieval and location mining. This paper will assist the upcoming researchers to have an insight into the significance of lightweight authentication protocols in WSNs.

Cite

CITATION STYLE

APA

Shanthi*, G. V., & Sunitha, D. K. V. N. (2020). A Review of Protocols Design in Secure and Efficient Authentication in Wireless Sensor Networks. International Journal of Innovative Technology and Exploring Engineering, 9(9), 541–546. https://doi.org/10.35940/ijitee.i7205.079920

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free