Downloads: 103
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015
Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane [2] | S. N. Shelke [2]
Abstract: Message authentication is one of the most effective ways to defeat unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). Wireless Sensor Networks (WSN) are being very popular day by day, however one of the main concern in WSN is its limited resources. One have to look to the resources to generate Message Authentication Code (MAC) keeping in mind the feasibility of method used for the sensor network at hand. For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we propose a scalable authentication scheme based on elliptic curve cryptography (ECC). While enabling intermediate nodes authentication, our proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem.
Keywords: Hop-by-hop authentication, symmetric-key cryptosystem, public-key cryptosystem, source privacy, simulation, wireless sensor networks WSNs, distributed algorithm, decentralized control
Edition: Volume 4 Issue 11, November 2015,
Pages: 2223 - 2228
Similar Articles with Keyword 'simulation'
Downloads: 105
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi [3] | Dr. S. K. Srivatsa
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 672 - 675Increasing the Trust Factor in Cognitive Radio Networks Driven by Software Defined Radio
Shashank Dhananjaya | Yuvaraju B N