Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 42, Pages: 1-4
Preeti Sharma* and Gaurav Gupta
*Author for correspondence
Preeti Sharma School of Electrical and Computer Science Engineering, Shoolini University Bhajol, Solan - 173229, Himachal Pradesh, India; [email protected]
Objectives: In WSN (Wireless Sensor Network) attacks are the central concern. In this paper, we discuss various authentication techniques and protocols for detection of attacks in WSN). Our scope be situated on the way to take new authentication technique by analyzing various techniques and protocols for detection of attack. This technique solves the problems in existing techniques like micro Timed Sufficient Streaming Loss Tolerant Authentication protocol (µ TESLA), Secured Network Encryption Protocol (SNEP), Long Term Equity Anticipation Security (LEAP) ad node authentication all these techniques require an extra amount of energy for computational cost is very high. Analysis: Wireless Sensor Network (WSN) is used in various applications to monitor the sensitive environment. These applications have a high impact in human pursuit, battlefield monitoring and surround watching. After the deployment of the sector nodes at respective places the manual maintenance and monitoring is minimum for long interval of time due to these conditions it creates security problems at sensitive areas wherever the appliance is deployed. In this environment anyone will comes within the network to modify and hack the data. Due to this reason interference of the network also suffers from several constraints like low computation capability and restricted energy. These constraints conjointly build a security as a challenge in Wireless Sensor Network. In this paper we have various security protocols and techniques to beat these problems. Findings: By the limitations of resource we analysis and find the Zero Knowledge Protocol with Interlock Protocol for Sybil attack detection in WSN. These techniques having a less bandwidth, small computational power and less memory space.
Keywords: Group Key Management, Long Term Equity Anticipation Security (LEAP), Micro Timed Sufficient Streaming Loss Tolerant Authentication Protocol (µ TESLA), Wireless Sensor Networks (WSN), Zero Knowledge Verification Protocol
Subscribe now for latest articles and news.