Message Authentication and Source Privacy in Wireless Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 121 | Views: 313

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 7, July 2016 | Popularity: 7 / 10


     

Message Authentication and Source Privacy in Wireless Networks

Vaishali Kisanrao Gulhane, S. N. Shelke


Abstract: Message authentication is a standout amongst the best approaches to ruin unapproved and defiled messages from being sent in wireless networks. Hence, numerous message validation plans have been produced, in view of either a symmetric-key cryptosystem or an open key cryptosystem. The vast majority of them, then again, have the impediments of high computational and correspondence overhead notwithstanding absence of adaptability and versatility to hub trading off assaults. To address these issues, a polynomial-based plan was as of late presented. On the other hand, this plan and its augmentations all have the shortcoming of an implicit edge controlled by the level of the polynomial when the quantity of messages transmitted is bigger than this edge, the enemy can completely recuperate the polynomial. we propose an adaptable confirmation plan taking into account elliptic curve. While empowering middle of the road hubs validation, our proposed plan permits any hubs to transmit a boundless number of messages without anguish the limit issue. In addition, our plan can likewise give message source protection using Block Authentication Code (BAC). The proposed system plan more proficient than the polynomial-based methodology regarding computational and correspondence overhead under similar security levels while giving message source protection.


Keywords: Hop-by-hop authentication, symmetric-key cryptosystem, public-key cryptosystem, source privacy, simulation, wireless networks, distributed algorithm, decentralized control, Block Authentication Code BAC


Edition: Volume 5 Issue 7, July 2016


Pages: 428 - 431



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Vaishali Kisanrao Gulhane, S. N. Shelke, "Message Authentication and Source Privacy in Wireless Networks", International Journal of Science and Research (IJSR), Volume 5 Issue 7, July 2016, pp. 428-431, https://www.ijsr.net/getabstract.php?paperid=ART201619, DOI: https://www.doi.org/10.21275/ART201619

Similar Articles

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1087 - 1091

Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud

Kavitha K, Manjula R

Share this Article

Downloads: 114

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1448 - 1452

Efficient Data Sharing in Cloud Medium with Key Aggregate Cryptosystem

C. Suganya, A. Sangeetha

Share this Article

Downloads: 116 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 924 - 926

An Optimised Key cryptography for Securing Cloud Data Sharing and Storage Environment

Viharika Sudanagunta, K. Narayana Rao

Share this Article

Downloads: 133

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2694 - 2697

A Review of Secure Data Sharing in Cloud using Key Aggregate Cryptosystem and Decoy Technology

Rushikesh V.Mahalle, Prof. Parnal P.Pawade

Share this Article
Top