Smart City Gnosys

Smart city article details

Title Light Weight Authentication Of Devices In Wireless Sensor Network
ID_Doc 35221
Authors Soni S.; Hussain M.
Year 2025
Published Procedia Computer Science, 252
DOI http://dx.doi.org/10.1016/j.procs.2025.01.061
Abstract A wireless sensor network (WSN) is a network made up of independent sensors spread across different locations, working together to observe and record physical or environmental data. These sensors communicate wirelessly and are often executed in several situations areas around the world due to their versatility and applicability. WSNs are utilized across the globe in diverse applications such as environmental monitoring, agriculture, healthcare, smart cities, industrial automation, military systems, and more. They enable real-time data collection, processing, and transmission, providing valuable insights into remote or inaccessible areas. In WSN The data is mushy, so secure communication between sensor nodes is required. The system requires node authentication to ensure the security of communications and to conserve the node's energy for potential use in other system functions. Nodes in WSNs have limited power, computational capacity, and storage. To overcome the security issues in WSN, we propose a protocol for a Light Weight authentication of devices in Wireless Sensor Networks. The proposed protocol remains impervious to interceptions and attacks by using time-bound validation, nonce, and hash techniques. The proposed protocol provides authentication of nodes, ensuring security while conserving resources. © 2025 The Authors. Published by Elsevier B.V.
Author Keywords Authentication; Security; Wireless Sensor Networks (WSNs)


Similar Articles


Id Similarity Authors Title Published
2314 View0.874Kezhong W.; Yutao W.; Ruicong Z.; Rundong Y.; Yu B.A Lightweight Authentication Method Between Homogeneous Nodes In Wireless Sensor Network Based On Message Authentication CodeProceedings - 2020 IEEE 8th International Conference on Smart City and Informatization, iSCI 2020 (2020)
16766 View0.87Neerul N.; Kumar D.Cryptanalysis And Improvement Of An Authentication Protocol For Wireless Sensor NetworksTransactions on Emerging Telecommunications Technologies, 34, 5 (2023)
47943 View0.87Luqman M.; Faridi A.R.Security In Wireless Sensor Network: A Current LookProceedings of the 2022 9th International Conference on Computing for Sustainable Global Development, INDIACom 2022 (2022)
8663 View0.861Reddy D.M.K.; Sathya R.; Lakshmi Y.V.A.S.An Investigative Study On Different Security Aspects Of Wireless Sensor NetworksLecture Notes in Networks and Systems, 1227 LNNS (2025)
8038 View0.859Singh S.; Singh A.An Enhanced Authenticated Key Agreement Scheme For Cloud-Based Iot In Wireless Sensor NetworksInternational Journal of Electrical and Electronics Research, 11, 4 (2023)
17349 View0.858Mary S.S.C.; Shri S.J.; Thenmozhi E.; Murugeswari K.Data Security In Wireless Sensor Networks Using An Efficient Cryptographic Technique To Protect Against IntrusionSSRG International Journal of Electronics and Communication Engineering, 10, 4 (2023)
23499 View0.85Rai A.K.; Daniel A.K.Energy-Efficient Model For Intruder Detection Using Wireless Sensor NetworkJournal of Interconnection Networks, 24, Supp01 (2024)