ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Message Authentication Protocol for Lifetime Proficient Hash Based Algorithm in Wireless Sensor Networks

Journal: International Journal of Advanced Networking and Applications (Vol.7, No. 06)

Publication Date:

Authors : ; ; ;

Page : 2963-2966

Keywords : Authentication; Hash function; Cryptography; Security; Wireless Sensor Networks (WSN);

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Wireless sensor networks are self organized, autonomous, automatic discovery of services, highly scalable, reliable, Infrastructure less service. Mainly applicable in the field of disaster, healthcare. The cryptographic operations such as hash based schemes are more energy consuming (more byte transmitted indirectly consumes more energy). To avoid the energy consumption over a cryptographic operations are design of Message Authentication protocoL for Lifetime enhancement In wireless sensor networks called MALLI, which uses a famous structure of hash algorithm 2AMD-160. To demonstrate that, the execution time and the security achieved by the proposed method are more effective than the MD5 and SHA1.

Last modified: 2016-07-15 16:56:27