A Review of Protocols Design in Secure and Efficient Authentication in Wireless Sensor Networks
G. Vijaya Shanthi1, K.V.N. Sunitha2

1G Vijaya Shanthi,* M. Tech Department of computer science and Engineering, Rayalaseema university, Kurnool, (AP), India.
2Dr K.V.N. Sunitha, Department of Computer Science and Engineering, BVRIT Hyderabad College of Engineering for Women Hyderabad, India.
Manuscript received on June 14, 2020. | Revised Manuscript received on June 29, 2020. | Manuscript published on July 10, 2020. | PP: 541-546 | Volume-9 Issue-9, July 2020 | Retrieval Number: 100.1/ijitee.I7205079920 | DOI: 10.35940/ijitee.I7205.079920
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Majority of the applications demand confidentiality and integrity of the shared information using Wireless Sensor Networks (WSNs). Key management schemes are one of the core concepts that ensure the security of WSNs. Prior key management schemes failed to provide required security arrangements in WSNs. Authentication is the core parameters that assess the capability of the deployed sensor nodes in the communication fields. In this paper, we review the existing authentication protocols by stating its merits and demerits. It is observed that the need for a secure and efficient authentication protocol is still in demand, owing to the real issues like identity overheads, information retrieval and location mining. This paper will assist the upcoming researchers to have an insight into the significance of lightweight authentication protocols in WSNs. 
Keywords: Wireless Sensor Networks, Authentication protocols, Key management schemes, Security and shared information.
Scope of the Article: Wireless Sensor Networks