A SURVEY ON AUTHENTICATION TECHNIQUES FOR WIRELESS MEDIUM

Authors

  • Pradeep M B Department of CSE, SET, Jain University, Bangalore, Karnataka, India
  • Manjunath C R Associate Professor, Department of CSE, SET, Jain University, Bangalore, Karnataka, India

DOI:

https://doi.org/10.29121/granthaalayah.v6.i5.2018.1464

Keywords:

Cryptic Scheme, Authentication, Encryption, QR Code, Trust Based Routing, Secure Communication

Abstract [English]

The wireless communication technology gaining importance in extreme conditions in a very effective way due to its benefits. Compared to wired networks, wireless networks have many benefits in terms of flexibility, cost, and mobility. Wireless networks can be easily hacked by the outsiders if there is no proper security. Because of its increasing popularity, wireless networks need proper security measures in addition to the normal protections such as firewalls, virus detectors, etc. Providing the required additional security to the wireless networks is a challenging task. Security can be maintained by providing data authenticity, integrity confidentiality, and authorization. A survey on the security of wireless networks is put forward that discusses various techniques which help in protecting the network and a cryptic secure scheme has been proposed which helps to enhance the security standards in the wireless medium.

Downloads

Download data is not yet available.

References

Akhil Gupta, R. K. (2015). Security Threats of Wireless Networks: A Survey. International Conference on Computing, Communication, and Automation, 389-395. DOI: https://doi.org/10.1109/CCAA.2015.7148407

Altisen, K. D. (2013). SR3: Secure resilient reputation-based routing. Distributed Computing in Sensor Systems (DCOSS), 258-265. DOI: https://doi.org/10.1109/DCOSS.2013.33

Hatzivasilis, G. P. (2017). SecRoute: End-to-end secure communications for wireless ad-hoc networks. Computers and Communications (ISCC), 2017 IEEE Symposium on. IEEE, 558-563. DOI: https://doi.org/10.1109/ISCC.2017.8024587

Jawhar, I. M. (2016). TRAS: A Trust-Based Routing Protocol for Ad Hoc and Sensor Networks. In Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), 2016 IEEE 2nd International Conference on IEEE, 382-387. DOI: https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.58

Perrig, A. S. (2005). The TESLA broadcast authentication protocol. Rsa Cryptobytes, 1-13.

Rantos, K. F. (2015). Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources. IEEE Systems Journal, 92 - 102.

Shepherd, C. G. (2016). Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems. In Trustcom/BigDataSE/I SPA, 2016 IEEE, 168-177. DOI: https://doi.org/10.1109/TrustCom.2016.0060

Srivastava, S. G. (2004). Reputation-based framework for high integrity sensor networks. 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 66-77.

Tang, C. a. (2008). An efficient mobile authentication scheme for wireless networks. IEEE Transactions on Wireless Communications, 1408-1416. DOI: https://doi.org/10.1109/TWC.2008.061080

Zhimeng, L. a. (2016). Provable Secure Node Authentication Protocol for Wireless Sensor Networks. Web Information Systems and Applications Conference, 221-224. DOI: https://doi.org/10.1109/WISA.2016.51

Zou, Y. Z. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727-1765. DOI: https://doi.org/10.1109/JPROC.2016.2558521

Sabina Barakovic, E. K. (2016). Security Issues in Wireless Networks: An Overview. 2016 XI International Symposium on Telecommunications (BIHTEL), 1-6. DOI: https://doi.org/10.1109/BIHTEL.2016.7775732

Mrs.A.S. Bhave, M. (2014). Secure Communication in Wireless Sensor Network using Symmetric and Asymmetric hybrid Encryption Scheme. IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 4, June 2014., 382-385.

JAEWON NOH, J. K. (2018). Secure Authentication and Four-way Handshake Scheme for Protected Individual Communication in Public Wi-Fi Networks. IEEE Access (2018) , 16539 - 16548.

Downloads

Published

2018-05-31

How to Cite

Pradeep, & Manjunath. (2018). A SURVEY ON AUTHENTICATION TECHNIQUES FOR WIRELESS MEDIUM. International Journal of Research -GRANTHAALAYAH, 6(5), 369–376. https://doi.org/10.29121/granthaalayah.v6.i5.2018.1464