ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)

Publication Date:

Authors : ; ;

Page : 2223-2228

Keywords : Hop-by-hop authentication; symmetric-key cryptosystem; public-key cryptosystem; source privacy; simulation; wireless sensor networks WSNs; distributed algorithm; decentralized control;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Message authentication is one of the most effective ways to defeat unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). Wireless Sensor Networks (WSN) are being very popular day by day, however one of the main concern in WSN is its limited resources. One have to look to the resources to generate Message Authentication Code (MAC) keeping in mind the feasibility of method used for the sensor network at hand. For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we propose a scalable authentication scheme based on elliptic curve cryptography (ECC). While enabling intermediate nodes authentication, our proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem.

Last modified: 2021-07-01 14:26:37