TY - GEN
T1 - A survey of authentication mechanisms authentication for ad-hoc wireless sensor networks
AU - Boyle, D.
AU - Newe, T.
PY - 2007
Y1 - 2007
N2 - Many applications of wireless sensor networks, such as homeland security and commercial applications collect and disseminate sensitive and important information. In order for these applications to operate successfully, it is necessary to maintain the privacy and security of transmitted data. What remains undefined is an agreeable and most effective way of securing the information. This paper considers current mechanisms of authentication used to achieve security. When a node of a network can be verified as being a valid member node of the network, by some security mechanism, this is known as authentication. This node may then send and receive trustworthy messages across the network, appended with a message authentication code that only other valid nodes, holding a shared secret, may access. A comparison table is presented, illustrating various properties held by these authentications protocols. This is beneficial to designers wishing to implement the most cost effective and appropriate protocol for the intended application, as the desirable characteristics, both simulation based and implementation based, are easily identifiable.
AB - Many applications of wireless sensor networks, such as homeland security and commercial applications collect and disseminate sensitive and important information. In order for these applications to operate successfully, it is necessary to maintain the privacy and security of transmitted data. What remains undefined is an agreeable and most effective way of securing the information. This paper considers current mechanisms of authentication used to achieve security. When a node of a network can be verified as being a valid member node of the network, by some security mechanism, this is known as authentication. This node may then send and receive trustworthy messages across the network, appended with a message authentication code that only other valid nodes, holding a shared secret, may access. A comparison table is presented, illustrating various properties held by these authentications protocols. This is beneficial to designers wishing to implement the most cost effective and appropriate protocol for the intended application, as the desirable characteristics, both simulation based and implementation based, are easily identifiable.
UR - http://www.scopus.com/inward/record.url?scp=34648831060&partnerID=8YFLogxK
U2 - 10.1109/SAS.2007.374370
DO - 10.1109/SAS.2007.374370
M3 - Conference contribution
AN - SCOPUS:34648831060
SN - 1424406781
SN - 9781424406784
T3 - Proceedings of the 2007 IEEE Sensors Applications Symposium, SAS
BT - Proceedings of the 2007 IEEE Sensors Applications Symposium, SAS
T2 - 2007 IEEE Sensors Applications Symposium, SAS
Y2 - 6 February 2007 through 8 February 2007
ER -