On this page
Research Article | Open Access
Volume 14 2022 | None
An Investigation of Secure Authentication Systems in Wireless Sensor Networks
Girija Vani , Noorullah C. Shariff , and Raj Kumar L Biradar
Pages: 4725-4733
Abstract
Wireless Sensor Networks (WSNs) links the real world to the Internet and humans. The convenient deployment scheme of sensor nodes renders them gain popularity to be used in monitoring regions of interest in various fields such as health monitoring, vehicular control, military surveillance, etc. Mobile sinks in WSNs are indispensable for effective data aggregation in different sensor applications, since they highly reduce the complexity of data aggregation. Mobile sink replication attack is regarded to be a strong attack faced in WSNs
Keywords
Mobile Sink Replication Techniques, Authentication Techniques, Compromised Nodes, Cryptographic Procedures, Key Management Schemes, Mobile Sinks, Network Resilience, Replication Attack, Wireless Sensor Networks
PDF
121
Views
72
Downloads