High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A Secure Crypt Analysis of Password Authenticated Key Exchange Methodology in Wireless Sensor Network




Authentication, Cryptanalysis, Password-Authenticated Key Agreement, Cross Domain


Wireless sensor networks are one of the most exciting then challenging research domains of our time. They have a great potential to be deployed now wide mission-critical applications, such as military monitoring, health care as well as civilian applications. The highly sensitive nature of gathered information makes security in these special networks a crucial concern. Owed to the hostile nature of their deployment environments, the wireless medium and the constrained nature of resources on the diminutive sensor devices used in such networks, security poses more severe challenges compared to the traditional networks. As per attacks to any part of the hardware or software may give significant damages to these networks. Actually, the development of effective and efficient defense mechanisms to those attacks must be addressed at every stage of the system design. We propose Rumor Riding (RR), a lightweight and non-path-based mutual anonymity protocol for decentralized P2P systems. Employing a random walk mechanism, RR proceeds advantage of lower overhead by mainly using the symmetric cryptographic algorithm. The proposed protocols security, simplicity, and speed make it ideal for a wide range of real-world applications now which secure password authentication is required.

Other Details

Paper ID: IJSRDV4I60417
Published in: Volume : 4, Issue : 6
Publication Date: 01/09/2016
Page(s): 1079-1082

Article Preview

Download Article