Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2016 (2016), Article ID 6854303, 16 pages
http://dx.doi.org/10.1155/2016/6854303
Review Article

Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

1Department of Computer Science and Engineering, Regional Centre of Anna University, Tirunelveli, Tamil Nadu 627 007, India
2Department of Computer Science and Engineering, National Engineering College, Kovilpatti, Tamil Nadu 628 503, India

Received 8 October 2015; Revised 19 December 2015; Accepted 20 December 2015

Academic Editor: Junghyun Nam

Copyright © 2016 S. Raja Rajeswari and V. Seenivasagam. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.