International Journal of Computer Applications
Wireless sensor networks are usually installed in rough environments and sometime when the traditional network fails to deploy on that environments. The nodes in the network collect data and information from its environment. These data are moves from one node to another. All the data are not publicly accessible; some of them contain confidential and valuable information which only be accessible through a proper secure mechanism between two communicating parties. A secure authentication scheme can solve this problem to access the confidential data and protect the unauthorized access.