Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks

Abstract

security to the data is actually provided by an authentication. Authentication involves a process of confirming an identity. In Wireless sensor networks a lot of message authentication schemes have been developed, based on symmetric-key cryptosystems or public-key cryptosystems. Message authentication is one of the most effective way to prevent illegal and tainted messages from being forwarded in wireless sensor networks (WSNs). For this cause, Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and pliability to node compromise attacks. To address these issues, a Polynomial-based scheme was recently introduced. Though, this scheme and its extensions all have the flaw of a built-in Threshold determined by the degree of the polynomial: when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we suggest a scalable authentication scheme based on Elliptic Curve Cryptography (ECC) with Schnorr Signcryption. While enabling intermediate nodes authentication, our proposed scheme solve the threshold problem. In addition, our scheme can also provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is efficient than the polynomial-based approach in terms of computational and communication overhead under comparable security levels.

Authors and Affiliations

N. Vijaya Bharatha Lakshmi| M.Tech (CSE), VIGNAN’s NIRULA Institute of technology and science for women, A.P., India, K. V. S. S. Rama Krishna| Asst.Professor, Dept. of Computer Science & Engineering, VIGNAN’s NIRULA Institute of technology and science for women, A.P., India

Keywords

Related Articles

A Study on Effect of Mechanical Properties Of Al-Zro2 Composite by Liquid Routing

In this paper, Al-ZrO2 composites are formed by Vortex method using ZrO2 powder with 1 micron regular diameter as reinforce particles and LM24 as the matrix metal. The melt composites are blended for 13 minutes, then...

Enhancement of Micro Grid Power Quality with cascaded Voltage-Current control

Microgrid (MG) is the indispensable infrastructure of now smart grid, however, variation and intermittence caused from unstable micro-sources and nonlinear loads will execute considerable impacts on normal operation of...

Accelerometer Based Vehicle Monitoring And Tracking System Using ARM Processor And GPS

This paper mainly deals with concept of Vehicle tracking, Monitoring and providing security by theft. This system is based on ARM7, GSM and GPS is proposed. GSM technology is used to send information about the vehicl...

A New Hybrid Topology of D-STATCOM for Power Quality Improvement

This work proposes an enhanced new breed conveyance static compensator (D-STATCOM) topology to address some down to earth issues, for example, power rating, filter size, performance of compensation, and power misfortu...

Design And Analysis Of Combined Extrusion Forging Die Behavior Under Thermal Structural Loads

We all know extrusion and forging are two different processes of manufacturing but in recent past researches combined these two process to reduce the production time, production cost etc.Combined extrusion-forging pr...

Download PDF file
  • EP ID EP16527
  • DOI -
  • Views 353
  • Downloads 10

How To Cite

N. Vijaya Bharatha Lakshmi, K. V. S. S. Rama Krishna (2015). Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks. International Journal of Science Engineering and Advance Technology, 3(8), 337-341. https://europub.co.uk/articles/-A-16527