摘要

Wireless Sensor Networks (WSNs) consists of low power nodes, with limited processing, communication, and storage. The networks are made up of tiny nodes which are becoming future of many applications,but due to deployment nature the sensor nodes are prone to physical attacks against the adversaries and resource limitations raises some serious question to secure these nodes. Random failure of nodes occurred in real-life deployment scenarios. Due to the resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Efficient key distribution and management mechanisms are needed besides lightweight ciphers. Many key establishment techniques have been designed to address the tradeoff between limited memory andsecurity, but which scheme is the most effective is still debatable. In this paper, we compare and analyse various authentication protocols.

  • 出版日期2011

全文