ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secured Data Handling for Wireless Sensor Networks

Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 8)

Publication Date:

Authors : ; ;

Page : 603-607

Keywords : Network security; mobile; wireless networks; efficiency; wireless nodes;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

As part of the security within distributed systems, various services and resources need protection from unauthorized use. remote authentication is the most commonly used method to determine the identity of a remote client. This paper investigates a systematic approach for authenticating clients by three factors, namely password, smart card, and biometrics. A generic and secure framework is proposed to upgrade two-factor authentication to three-factor authentication. In multihop wireless networks, selfish nodes do not relay other nodes packets and make use of the cooperative nodes to relay their packets, which has negative impact on the network fairness and performance. Incentive protocols use credits to stimulate the selfish nodes cooperation, but the existing protocols usually rely on the heavyweight public-key operations to secure the payment. In this paper, we propose secure cooperation incentive protocol that uses the public-key operations only for the first packet in a series and uses the lightweight hashing operations in the next packets, so that the overhead of the packet series converges to that of the hashing operations.

Last modified: 2021-06-30 21:05:59