By Topic

A Survey of Authentication Mechanisms: Authentication for Ad-Hoc Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Boyle, P. ; Univ. of Limerick, Limerick ; Newe, T.

Many applications of wireless sensor networks, such as homeland security and commercial applications collect and disseminate sensitive and important information. In order for these applications to operate successfully, it is necessary to maintain the privacy and security of transmitted data. What remains undefined is an agreeable and most effective way of securing the information. This paper considers current mechanisms of authentication used to achieve security. When a node of a network can be verified as being a valid member node of the network, by some security mechanism, this is known as authentication. This node may then send and receive trustworthy messages across the network, appended with a message authentication code that only other valid nodes, holding a shared secret, may access. A comparison table is presented, illustrating various properties held by these authentications protocols. This is beneficial to designers wishing to implement the most cost effective and appropriate protocol for the intended application, as the desirable characteristics, both simulation based and implementation based, are easily identifiable.

Published in:

Sensors Applications Symposium, 2007. SAS '07. IEEE

Date of Conference:

6-8 Feb. 2007