ESAF: An Enhanced and Secure Authenticated Framework for Wireless Sensor Networks

Wireless Sensor Network (WSN) is an application centred network which provide physical data from environment where it is positioned. WSNs are employed in numerous environmental applications such as in flood detection, traffic monitoring and many more. However, the security of wireless sensor network...

Full description

Saved in:
Bibliographic Details
Published inWireless personal communications Vol. 136; no. 3; pp. 1651 - 1673
Main Authors Sharma, Shanil, Rana, Saurabh, Dubey, Sudhanshu Shekhar
Format Journal Article
LanguageEnglish
Published New York Springer US 01.06.2024
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Wireless Sensor Network (WSN) is an application centred network which provide physical data from environment where it is positioned. WSNs are employed in numerous environmental applications such as in flood detection, traffic monitoring and many more. However, the security of wireless sensor network becomes a daunting task. Inspite of its potential advantages, there exist numerous security flaws that directly triggers the privacy of data. Some of the constrainments of WSN encompasses less memory, little computational performance, confined energy assests and are also receptive towards unprotected wireless communicating channels. Apart from these, majority of prevailing networks utilize shared key amidst nodes which ultimately leads to impersonation attack, replay attack etc. In an effort to provide data access to authorized users, there is a requirement of secure and efficient authentication scheme. However, numerous schemes related to authentication are designed in recent years. But most of the schemes have several security issues on account of limited resources in relation to speed, power and are unsuited for wireless sensor networks. With the aim to put off the imperfections of these schemes, we design a secure authenticated framework for Wireless sensor networks. Furthermore, the performance comparison based on computational time along with security features of related schemes displays that the proposed scheme is dominant in WSNs.
ISSN:0929-6212
1572-834X
DOI:10.1007/s11277-024-11352-4