Call For Paper Volume:4 Issue:8 Aug'2017 |

A Review on Authentication of Message Through Hop By Hop With Source Privacy In Wireless Sensor Networks Using Optimal Technique

Publication Date : 01/11/2015



Author(s) :

Ms. A. R. Kukade , Prof. N. M. Dhande.


Volume/Issue :
Volume 2
,
Issue 10
(11 - 2015)



Abstract :

Authentication of Message in Wireless Sensor Networks (WSNs) is one of the most effective ways to thwart unauthorized and corrupted messages. For this purpose, there are number of different scheme for message authentication based on cryptography which includes either symmetric-key cryptosystems or public-key cryptosystems. Most of them, have the limitations for high computational and communication overhead with the lack of scalability and resilience to node compromise attacks. There are number of solutions for this problem. Here is one scheme which gives one better way. In this paper, we propose a scheme for message authentication which is based on Elliptic Curve Cryptography (ECC). Our scheme can provide message source privacy with authentication for intermediate nodes. Both theoretical analysis and simulation results demonstrate that our proposed scheme is more efficient than the polynomial-based approach in terms of computational and communication overhead under comparable security levels while providing message source privacy.


No. of Downloads :

3


Indexing

Web Design MymensinghPremium WordPress ThemesWeb Development

A Review on Authentication of Message Through Hop By Hop With Source Privacy In Wireless Sensor Networks Using Optimal Technique

October 30, 2015