High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Improved, Robust and Dynamic User Authentication Scheme by Using Secured Key Management in Wireless Sensor Network




Authentication, Security Attacks, WSNs, Salted hash based Security algorithm


In today’s world security become one of the important constraints in every research field. By increasing use of Wireless Sensor Networks (WSN) in various critical applications security of wireless networks is becoming more important day by day. Today almost every important area makes use of wireless sensor networks. As Wireless Sensor Network is infrastructure-less network; data moves explicitly from one node to another thus captured easily by attackers. To avoid data from being stolen security mechanism has to be functional. Many protocols are available for providing security on a wireless network. By performing a detailed study of different security mechanisms used in sensor network against some criteria such as nature of the algorithm, working, its benefits and some of the disadvantages of mechanism and also compare them. Some schemes use elliptic curve cryptography for better security but require sensors with strict resource constraint to perform computationally luxurious scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. The proposed work implements that salted hash based algorithm as a security concentrated work.

Other Details

Paper ID: IJSRDV4I60546
Published in: Volume : 4, Issue : 6
Publication Date: 01/09/2016
Page(s): 1024-1028

Article Preview

Download Article