
pmid: 26881272
pmc: PMC4737465
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.
FOS: Computer and information sciences, Technology, Alternative medicine, Computer Networks and Communications, User Authentication Methods and Security Measures, Science, Encryption, Review Article, Key management, Computer security, Pathology, Key (lock), Security Protocols for Authentication and Key Exchange, Lightweight Extensible Authentication Protocol, Authentication, Computer network, Wireless Networks, T, Q, R, Secure Routing, Computer science, Challenge-Handshake Authentication Protocol, Authentication (law), Computer Science, Physical Sciences, Protocol (science), Security Protocols, Medicine, Security in Wireless Sensor Networks, Authentication protocol, Wireless Sensor Networks, Wireless sensor network, Information Systems
FOS: Computer and information sciences, Technology, Alternative medicine, Computer Networks and Communications, User Authentication Methods and Security Measures, Science, Encryption, Review Article, Key management, Computer security, Pathology, Key (lock), Security Protocols for Authentication and Key Exchange, Lightweight Extensible Authentication Protocol, Authentication, Computer network, Wireless Networks, T, Q, R, Secure Routing, Computer science, Challenge-Handshake Authentication Protocol, Authentication (law), Computer Science, Physical Sciences, Protocol (science), Security Protocols, Medicine, Security in Wireless Sensor Networks, Authentication protocol, Wireless Sensor Networks, Wireless sensor network, Information Systems
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 19 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
