Downloads: 111 | Views: 275
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015 | Popularity: 6.7 / 10
Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm
Priya T V, Sreerag B M
Abstract: Message authentication is one of the important parameter used to avoid unauthorized accesses in Wireless Sensor Networks (WSN). Because of its importance many authentication schemes were developed based on symmetric key cryptosystems and public key cryptosystems. But they all faced the challenge of high communication and computational overhead. To solve this problems authentication based on ECC was introduced. This authentication scheme is advantageous in terms of computational overhead, memory space utilization and security resilience. Our main aim is to minimize the total power consumption of the nodes in WSN and thereby to save the precious sensor energy. Hence an authentication scheme based on ECDSA was proposed in this paper which is a variant of ElGamal signature scheme recently proposed. This can be used to provide source anonymity along with message authentication. The simulation results show that the proposed scheme is faster and generates smaller signature which adds to the advantage of the system.
Keywords: wireless sensor networks, ECC, source anonymity
Edition: Volume 4 Issue 2, February 2015
Pages: 2334 - 2337
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera