Secured Data Handling for Wireless Sensor Networks
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 8)Publication Date: 2014-08-05
Authors : Barla. Bhavani; T. Madhavi Kumari;
Page : 603-607
Keywords : Network security; mobile; wireless networks; efficiency; wireless nodes;
Abstract
As part of the security within distributed systems, various services and resources need protection from unauthorized use. remote authentication is the most commonly used method to determine the identity of a remote client. This paper investigates a systematic approach for authenticating clients by three factors, namely password, smart card, and biometrics. A generic and secure framework is proposed to upgrade two-factor authentication to three-factor authentication. In multihop wireless networks, selfish nodes do not relay other nodes packets and make use of the cooperative nodes to relay their packets, which has negative impact on the network fairness and performance. Incentive protocols use credits to stimulate the selfish nodes cooperation, but the existing protocols usually rely on the heavyweight public-key operations to secure the payment. In this paper, we propose secure cooperation incentive protocol that uses the public-key operations only for the first packet in a series and uses the lightweight hashing operations in the next packets, so that the overhead of the packet series converges to that of the hashing operations.
Other Latest Articles
- Intelligent Traffic Management Service for High-Speed Networks Using Fuzzy Logic Control
- Geophone Accident Prevention System
- Shell-Model Study of Neutron Rich Even-Even 52,54,56Cr Isotopes
- Study on Mechanical Characteristics of Unidirectional Sisal/Glass Fiber Reinforced Polyester Hybrid Composites
- Assessment of Factors Affecting Sustainability of Rural Water Supply Schemes in Nyandarua County, Kenya: A Case of Kangui Water Scheme
Last modified: 2021-06-30 21:05:59