Secure Authentication Technique for Cluster Based Wireless Sensor Networks

  • Unique Paper ID: 143659
  • Volume: 2
  • Issue: 12
  • PageNo: 367-372
  • Abstract:
  • Novel development in remote correspondences and hardware has prompted the advancement of minimal effort, low power and multifunctional little savvy sensors. These sensors can sense, process information and speak with each other through a remote association. Accumulation of an extensive number of these sensors is known as a remote sensor system (WSN). In remote sensor systems hubs are sent to distinguish occasions or ecological marvels by detecting, handling and sending information to an intrigued client. Bunching is a compelling and down to earth approach to upgrade the framework execution of WSNs. In this paper, we take in a protected information transmission for group based WSNs (CWSNs), where the bunches are shaped powerfully and occasionally. We propose two Secure and Efficient information Transmission (SET) conventions for CWSNs, called SET-IBS and SET-IBOOS, by utilizing the Identity-Based computerized Signature (IBS) plan and the Identity-Based Online/Offline advanced Signature (IBOOS) plan, individually. In SET-IBS, security depends on the hardness of the Diffie-Hellman issue in the matching area. SET-IBOOS further diminishes the computational overhead for convention security, which is pivotal for WSNs, while its security depends on the hardness of the discrete logarithm issue. We demonstrate the plausibility of the SET-IBS and SET-IBOOS conventions regarding the security necessities and security examination against different assaults. The computations and reenactments are given to delineate the productivity of the proposed conventions.
email to a friend

Cite This Article

  • ISSN: 2349-6002
  • Volume: 2
  • Issue: 12
  • PageNo: 367-372

Secure Authentication Technique for Cluster Based Wireless Sensor Networks

Related Articles