preview

Using Lightweight Dynamic User Authentication Scheme

Decent Essays

There are many popular authentication protocol schemes and some of them are as follows. Lightweight Dynamic User Authentication Scheme – In Wireless Sensor Networks the authorized users can access and communicate with the sensor nodes. This scheme comprises of registration, login and authentication phases. Based on the predefined period the user registers and gets access to secure data and restarts if period expires. It states it is secure only against replay and forgery attacks. And provides many benefits like efficiency, avoiding leakage of password, etc. Lightweight Trust Model – Usage of this scheme benefits in reducing the memory consumption and energy. And it is done by three steps such as computing bytes, not storing the value in the transaction table, consuming 3 bits of memory and also avoids promiscuous operation mode. Lightweight Authentication Scheme – This requires HMAC and encryption algorithms and decrease the effects of resource consumption attack. It consists of three phases such as key predistribution phase, network initialization phase and authentication protocol. Secured Energy Conserving Slot-Based Topology Maintenance Protocol uses a symmetric key-based authentication mechanism for a sleep/wake-up schedule of nodes for better energy efficiency and increase in lifetime the network. Lightweight Key Management Scheme – This reduces the resource consumption and acts as building block for all mechanisms. It requires less key storage with minimal number of

Get Access