ESAF: An Enhanced and Secure Authenticated Framework for Wireless Sensor Networks
Wireless Sensor Network (WSN) is an application centred network which provide physical data from environment where it is positioned. WSNs are employed in numerous environmental applications such as in flood detection, traffic monitoring and many more. However, the security of wireless sensor network...
Saved in:
Published in | Wireless personal communications Vol. 136; no. 3; pp. 1651 - 1673 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.06.2024
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Wireless Sensor Network (WSN) is an application centred network which provide physical data from environment where it is positioned. WSNs are employed in numerous environmental applications such as in flood detection, traffic monitoring and many more. However, the security of wireless sensor network becomes a daunting task. Inspite of its potential advantages, there exist numerous security flaws that directly triggers the privacy of data. Some of the constrainments of WSN encompasses less memory, little computational performance, confined energy assests and are also receptive towards unprotected wireless communicating channels. Apart from these, majority of prevailing networks utilize shared key amidst nodes which ultimately leads to impersonation attack, replay attack etc. In an effort to provide data access to authorized users, there is a requirement of secure and efficient authentication scheme. However, numerous schemes related to authentication are designed in recent years. But most of the schemes have several security issues on account of limited resources in relation to speed, power and are unsuited for wireless sensor networks. With the aim to put off the imperfections of these schemes, we design a secure authenticated framework for Wireless sensor networks. Furthermore, the performance comparison based on computational time along with security features of related schemes displays that the proposed scheme is dominant in WSNs. |
---|---|
ISSN: | 0929-6212 1572-834X |
DOI: | 10.1007/s11277-024-11352-4 |