Comprehensive Analysis of Broadcast Authentication protocols in Wireless Sensor Networks
Masoum Farahmandian, Mohammad Masdari, Vahid Farahmandian

Abstract
Wireless sensor networks (WSNs) due to law costs and easy communication are used in different environments for surveillance activities. One the most important issues raised in these networks is the usage of a good broadcast authentication mechanism. This mechanism helps to provide the security of these networks efficiently. User authentication is a crucial service in wireless sensor networks that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment.A broadcast authentication mechanism is important in wireless sensor networks. Researchers have provided various authentication mechanisms– which have their own advantages and disadvantages– in these networks. In this paper we analyze and review some popular authentication schemes which are recently proposed for WSNs.

Full Text: PDF     DOI: 10.15640/jcsit.v2n3-4a6