Skip to main content

Implementation of Authentication and Access Control Protocol for Heterogeneous Network

  • Chapter
  • First Online:
Book cover Pervasive Computing: A Networking Perspective and Future Directions

Abstract

Wireless sensor networks (WSNs) are centralized networks of sensor nodes which communicate through a base station using wireless medium. On the contrary, mobile ad hoc networks (MANETs) are infrastructure less network created dynamically. Sensor nodes forming the network have low power, less memory, less computational capacity and often deployed in emergency environment as per the application requirement. As nodes communicate with each other wirelessly, they become vulnerable to different attacks like eavesdropping, denial of service (DOS). To avoid the intrusion from the unauthorized user, authentication and data access control become very necessary. This paper illustrates the implementation of two of such techniques, mutual authentication and access control based on elliptic curve cryptography (MAACE) and energy-efficient access control scheme based on elliptic curve cryptography (ENABLE) for heterogeneous network on network simulator 2 platform with comparison of performance evaluation of the authentication protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Stavroulakis, P., & Stamp, M. (2010). Handbook of information and communication security. Berlin, Heidelberg: Springer. ISBN 978-3-642-04116-7.

    Book  Google Scholar 

  2. Aldabbas, H., & Janicke, H. (2014). Review of security in VANETS and MANETS. Chapter January 2014. http://www.Researchgate.Net/Publication/268219261.

  3. Yang, S.-H. (2014). Wireless sensor networks, signals and communication technology. London: Springer. https://doi.org/10.1007/978-1-4471-5505-8_9.

    Book  Google Scholar 

  4. Xuan Hung, L., et al. (2009). An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Journal of Communications and Networks, 11(6), 599–606.

    Article  Google Scholar 

  5. Xuan Hung, L., et al. (2011). An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. Journal of Networks, 6(3), 355–364.

    Google Scholar 

  6. Lee, Y. S., Alasaarela, E., & Lee, H. J. (2014). Secure key management scheme based on ECC algorithm for patient’s medical information in healthcare system, ICOIN 2014, 978-1-4799-3689-2/14/ IEEE.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vivek Ugale .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ugale, V., Pawar, S.S., Gaikwad, Y.M. (2019). Implementation of Authentication and Access Control Protocol for Heterogeneous Network. In: Bhargava, D., Vyas, S. (eds) Pervasive Computing: A Networking Perspective and Future Directions. Springer, Singapore. https://doi.org/10.1007/978-981-13-3462-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3462-7_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3461-0

  • Online ISBN: 978-981-13-3462-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics