Improve hop-by-hop message authentication using GECC algorithms
Journal: International Journal of Computer Techniques (Vol.3, No. 1)Publication Date: 2016-01-01
Authors : K.E. Eswari R.G.Subarna;
Page : 14-24
Keywords : Improve Hop-by-hop authentication; symmetric-key cryptosystem; private-key cryptosystem; source privacy; virtual reality; wireless sensor networks (WSNs); GECC algorithm; spread out control; heterogeneous node; multiple station;
Abstract
Message authentication is very real techniques to prevent unsanctioned and besmirched messages from forwarded in wireless sensor networks (WSNs). So most of the message authentication schemes have used to established either symmetric-key cryptosystems or public-key cryptosystems. Conversely, have the restrictions of extraordinary computational and communication upstairs of want to more measurement and flexibility to node negotiation attacks. For discourse these problems, a polynomial-based scheme was recently introduced. Though, this scheme and its delays all the fault of a built-in verge strong-minded by the degree of the polynomial: The number of messages transmitted is superior than this verge, the opponent can fully get well the polynomial. So this paper details about the message authentication scheme based on global elliptic curve cryptography (GECC). Although enabling intermediary nodes authentication, this scheme used to permits any node can be transmit an unrestricted number of messages without misery the verge problem. In additional feature of this scheme is also deliver message source privacy. Together theoretical examination and recreation outcomes establish that proposed scheme is most well-organized than the polynomial-based approach in terms of computational and communication upstairs under equivalent sanctuary levels whereas provided that message source privacy. This paper based on private-key, considered as heterogeneous sensor node and multiple base station allowed.
Other Latest Articles
- Carob (Ceratonia siliqua L.) (pod, pulp, seed) flours and pulp mucilage affect kefir quality and antioxidant capacity during storage
- Missing Value Imputation Based on MINNS-SVM
- Load balancing with Modify Approach
- Query authentication based on Apriori algorithm in outsourcing spatial database
- Unary Association Rules Survey of Mining Services
Last modified: 2018-05-18 18:46:20