Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks

Abstract

security to the data is actually provided by an authentication. Authentication involves a process of confirming an identity. In Wireless sensor networks a lot of message authentication schemes have been developed, based on symmetric-key cryptosystems or public-key cryptosystems. Message authentication is one of the most effective way to prevent illegal and tainted messages from being forwarded in wireless sensor networks (WSNs). For this cause, Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and pliability to node compromise attacks. To address these issues, a Polynomial-based scheme was recently introduced. Though, this scheme and its extensions all have the flaw of a built-in Threshold determined by the degree of the polynomial: when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we suggest a scalable authentication scheme based on Elliptic Curve Cryptography (ECC) with Schnorr Signcryption. While enabling intermediate nodes authentication, our proposed scheme solve the threshold problem. In addition, our scheme can also provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is efficient than the polynomial-based approach in terms of computational and communication overhead under comparable security levels.

Authors and Affiliations

N. Vijaya Bharatha Lakshmi| M.Tech (CSE), VIGNAN’s NIRULA Institute of technology and science for women, A.P., India, K. V. S. S. Rama Krishna| Asst.Professor, Dept. of Computer Science & Engineering, VIGNAN’s NIRULA Institute of technology and science for women, A.P., India

Keywords

Related Articles

Analysis of Sandwich Beam

Sandwich beams are composite systems having high stiffness-to-weight and Strength-toweight ratios and are used as light weight load bearing components. The use of thin, strong skin sheets adhered to thicker, lightweig...

An Suitable Minimum Utility Threshold By Trial And Error Is A Tedious Process For Users

We address the above issues by proposing another system for top-k high utility itemset mining, where k is the coveted number of HUIs to be mined. Two sorts of effective calculations named TKU (mining Top-K Utility it...

Area and Power efficient booth’s Multipliers Based on Non-Redundant Radix-4Signed-Digit Encoding

In this paper, we present a design of preencoded multipliers for Digital Signal Processing applications in light of disconnected encoding of coefficients. To this broaden, the Non-Redundant radix-4 Signed-Digit (NR4SD...

Fault Detection of Ball Bearing Using Finite Element Analysis

During the last decade’s vibration based damage detection methods have attracted the most attention due to their simplicity for implementation. This research mainly deals with detection of faults through vibration...

Control of a Three-Phase DC-AC Converter With an Unbalanced AC Source

Three-stage dc–ac control converters experience the ill effects of energy swaying and over current issues if there should be an occurrence of the uneven air conditioning source voltage that can be caused by matrix/g...

Download PDF file
  • EP ID EP16527
  • DOI -
  • Views 377
  • Downloads 10

How To Cite

N. Vijaya Bharatha Lakshmi, K. V. S. S. Rama Krishna (2015). Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks. International Journal of Science Engineering and Advance Technology, 3(8), 337-341. https://europub.co.uk/articles/-A-16527