A SURVEY ON AUTHENTICATION TECHNIQUES FOR WIRELESS MEDIUM
DOI:
https://doi.org/10.29121/granthaalayah.v6.i5.2018.1464Keywords:
Cryptic Scheme, Authentication, Encryption, QR Code, Trust Based Routing, Secure CommunicationAbstract [English]
The wireless communication technology gaining importance in extreme conditions in a very effective way due to its benefits. Compared to wired networks, wireless networks have many benefits in terms of flexibility, cost, and mobility. Wireless networks can be easily hacked by the outsiders if there is no proper security. Because of its increasing popularity, wireless networks need proper security measures in addition to the normal protections such as firewalls, virus detectors, etc. Providing the required additional security to the wireless networks is a challenging task. Security can be maintained by providing data authenticity, integrity confidentiality, and authorization. A survey on the security of wireless networks is put forward that discusses various techniques which help in protecting the network and a cryptic secure scheme has been proposed which helps to enhance the security standards in the wireless medium.
Downloads
References
Akhil Gupta, R. K. (2015). Security Threats of Wireless Networks: A Survey. International Conference on Computing, Communication, and Automation, 389-395. DOI: https://doi.org/10.1109/CCAA.2015.7148407
Altisen, K. D. (2013). SR3: Secure resilient reputation-based routing. Distributed Computing in Sensor Systems (DCOSS), 258-265. DOI: https://doi.org/10.1109/DCOSS.2013.33
Hatzivasilis, G. P. (2017). SecRoute: End-to-end secure communications for wireless ad-hoc networks. Computers and Communications (ISCC), 2017 IEEE Symposium on. IEEE, 558-563. DOI: https://doi.org/10.1109/ISCC.2017.8024587
Jawhar, I. M. (2016). TRAS: A Trust-Based Routing Protocol for Ad Hoc and Sensor Networks. In Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), 2016 IEEE 2nd International Conference on IEEE, 382-387. DOI: https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.58
Perrig, A. S. (2005). The TESLA broadcast authentication protocol. Rsa Cryptobytes, 1-13.
Rantos, K. F. (2015). Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources. IEEE Systems Journal, 92 - 102.
Shepherd, C. G. (2016). Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems. In Trustcom/BigDataSE/I SPA, 2016 IEEE, 168-177. DOI: https://doi.org/10.1109/TrustCom.2016.0060
Srivastava, S. G. (2004). Reputation-based framework for high integrity sensor networks. 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 66-77.
Tang, C. a. (2008). An efficient mobile authentication scheme for wireless networks. IEEE Transactions on Wireless Communications, 1408-1416. DOI: https://doi.org/10.1109/TWC.2008.061080
Zhimeng, L. a. (2016). Provable Secure Node Authentication Protocol for Wireless Sensor Networks. Web Information Systems and Applications Conference, 221-224. DOI: https://doi.org/10.1109/WISA.2016.51
Zou, Y. Z. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727-1765. DOI: https://doi.org/10.1109/JPROC.2016.2558521
Sabina Barakovic, E. K. (2016). Security Issues in Wireless Networks: An Overview. 2016 XI International Symposium on Telecommunications (BIHTEL), 1-6. DOI: https://doi.org/10.1109/BIHTEL.2016.7775732
Mrs.A.S. Bhave, M. (2014). Secure Communication in Wireless Sensor Network using Symmetric and Asymmetric hybrid Encryption Scheme. IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 4, June 2014., 382-385.
JAEWON NOH, J. K. (2018). Secure Authentication and Four-way Handshake Scheme for Protected Individual Communication in Public Wi-Fi Networks. IEEE Access (2018) , 16539 - 16548.
Downloads
Published
How to Cite
Issue
Section
License
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.