Implementation of Authentication and Access Control Protocol for Heterogeneous Network

  • Vivek UgaleEmail author
  • Swati Suresh Pawar
  • Yogesh Murlidhar Gaikwad


Wireless sensor networks (WSNs) are centralized networks of sensor nodes which communicate through a base station using wireless medium. On the contrary, mobile ad hoc networks (MANETs) are infrastructure less network created dynamically. Sensor nodes forming the network have low power, less memory, less computational capacity and often deployed in emergency environment as per the application requirement. As nodes communicate with each other wirelessly, they become vulnerable to different attacks like eavesdropping, denial of service (DOS). To avoid the intrusion from the unauthorized user, authentication and data access control become very necessary. This paper illustrates the implementation of two of such techniques, mutual authentication and access control based on elliptic curve cryptography (MAACE) and energy-efficient access control scheme based on elliptic curve cryptography (ENABLE) for heterogeneous network on network simulator 2 platform with comparison of performance evaluation of the authentication protocols.


Access control Authentication ECC ENABLE MAACE MANET WSN 


  1. 1.
    Stavroulakis, P., & Stamp, M. (2010). Handbook of information and communication security. Berlin, Heidelberg: Springer. ISBN 978-3-642-04116-7.CrossRefGoogle Scholar
  2. 2.
    Aldabbas, H., & Janicke, H. (2014). Review of security in VANETS and MANETS. Chapter January 2014. http://www.Researchgate.Net/Publication/268219261.
  3. 3.
    Yang, S.-H. (2014). Wireless sensor networks, signals and communication technology. London: Springer. Scholar
  4. 4.
    Xuan Hung, L., et al. (2009). An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Journal of Communications and Networks, 11(6), 599–606.CrossRefGoogle Scholar
  5. 5.
    Xuan Hung, L., et al. (2011). An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. Journal of Networks, 6(3), 355–364.Google Scholar
  6. 6.
    Lee, Y. S., Alasaarela, E., & Lee, H. J. (2014). Secure key management scheme based on ECC algorithm for patient’s medical information in healthcare system, ICOIN 2014, 978-1-4799-3689-2/14/ IEEE.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Vivek Ugale
    • 1
    Email author
  • Swati Suresh Pawar
    • 1
  • Yogesh Murlidhar Gaikwad
    • 1
  1. 1.Department Electronics and Telecommunication EngineeringSITRCNashikIndia

Personalised recommendations