ANALYSIS OF VARIOUS AUTHENTICATION ALGORITHMS IN WIRELESS SENSOR NETWORKS

Main Article Content

Anupama Khatak
Raman Maini

Abstract

With the passing challenging years there is an advancement in technology from wireless communication networks to wireless sensor networks. These sensor nodes are capable of exchanging information using radio singles. Collection of hundreds of thousands of such sensor nodes are typically defined as wireless sensor networks. Wireless sensor nodes are placed unattended, in open social environment to monitor environmental and physical conditions. They are adaptable to maintain vast range of functions. In this work various attacks, authentication algorithms, and their comparison has been discussed. It has been observed that RSA algorithm reside on the key size and the significance of the exponent, ECC resides on the key size and the type of algorithm. whereas hash, due to its compressed output it computes fast operations.

Downloads

Download data is not yet available.

Article Details

Section
Articles