Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)Publication Date: 2015-11-05
Authors : Vaishali Kisanrao Gulhane; S. N. Shelke;
Page : 2223-2228
Keywords : Hop-by-hop authentication; symmetric-key cryptosystem; public-key cryptosystem; source privacy; simulation; wireless sensor networks WSNs; distributed algorithm; decentralized control;
Abstract
Message authentication is one of the most effective ways to defeat unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). Wireless Sensor Networks (WSN) are being very popular day by day, however one of the main concern in WSN is its limited resources. One have to look to the resources to generate Message Authentication Code (MAC) keeping in mind the feasibility of method used for the sensor network at hand. For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we propose a scalable authentication scheme based on elliptic curve cryptography (ECC). While enabling intermediate nodes authentication, our proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem.
Other Latest Articles
- Efficient Signal Detection Techniques in TV White Space using Cognitive Radio
- Fixed Point Theorem for Compatible Mapping in Fuzzy Metric Space
- Calculation of Bags Constant Using Plancks Equation of Black Body Radiation
- Relations between Catharanthine Content Enhancement with the Other Associated Secondary Metabolites in Catharanthus Roseus Cell Culture that Treated Tryptophan
- Unilateral Choanal Atresia in Adult: Case Report
Last modified: 2021-07-01 14:26:37