Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
security to the data is actually provided by an authentication. Authentication involves a process of confirming an identity. In Wireless sensor networks a lot of message authentication schemes have been developed, based on symmetric-key cryptosystems or public-key cryptosystems. Message authentication is one of the most effective way to prevent illegal and tainted messages from being forwarded in wireless sensor networks (WSNs). For this cause, Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and pliability to node compromise attacks. To address these issues, a Polynomial-based scheme was recently introduced. Though, this scheme and its extensions all have the flaw of a built-in Threshold determined by the degree of the polynomial: when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we suggest a scalable authentication scheme based on Elliptic Curve Cryptography (ECC) with Schnorr Signcryption. While enabling intermediate nodes authentication, our proposed scheme solve the threshold problem. In addition, our scheme can also provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is efficient than the polynomial-based approach in terms of computational and communication overhead under comparable security levels.
Authors and Affiliations
N. Vijaya Bharatha Lakshmi| M.Tech (CSE), VIGNAN’s NIRULA Institute of technology and science for women, A.P., India, K. V. S. S. Rama Krishna| Asst.Professor, Dept. of Computer Science & Engineering, VIGNAN’s NIRULA Institute of technology and science for women, A.P., India
Formulating Heat Transfer Across The Head-Media Interface- HAMR
All past thermal demonstrating on warmth trade between hard disk drive (HDD) head and media regarded media as a warmth sink with uniform encompassing temperature. However in warmth helped attractive recording (HAMR)...
A New Revocable IBE Scheme in the Server Aided Setting
This work going for handling the basic issue of character repudiation, we bring outsourcing calculation into IBE surprisingly and propose a revocable IBE plot in the server-supported setting. Our plan offloads the va...
Thermal Analysis Of A Gas Turbine Rotor Blade
A turbine rotor blade is the individual component which makes up the turbine section of a gas turbine. The blades are responsible for extracting energy from the high temperature, high pressure gas produced by the com...
Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks
security to the data is actually provided by an authentication. Authentication involves a process of confirming an identity. In Wireless sensor networks a lot of message authentication schemes have been developed, ba...
A Survey of Fourth Generation Technologies in Cellular Networks
The improvement of broadband remote get to advances as of late was the consequence of developing interest for versatile Internet and remote interactive media applications. Portable correspondence assumes a most vital...