Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks

Abstract

security to the data is actually provided by an authentication. Authentication involves a process of confirming an identity. In Wireless sensor networks a lot of message authentication schemes have been developed, based on symmetric-key cryptosystems or public-key cryptosystems. Message authentication is one of the most effective way to prevent illegal and tainted messages from being forwarded in wireless sensor networks (WSNs). For this cause, Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and pliability to node compromise attacks. To address these issues, a Polynomial-based scheme was recently introduced. Though, this scheme and its extensions all have the flaw of a built-in Threshold determined by the degree of the polynomial: when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we suggest a scalable authentication scheme based on Elliptic Curve Cryptography (ECC) with Schnorr Signcryption. While enabling intermediate nodes authentication, our proposed scheme solve the threshold problem. In addition, our scheme can also provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is efficient than the polynomial-based approach in terms of computational and communication overhead under comparable security levels.

Authors and Affiliations

N. Vijaya Bharatha Lakshmi| M.Tech (CSE), VIGNAN’s NIRULA Institute of technology and science for women, A.P., India, K. V. S. S. Rama Krishna| Asst.Professor, Dept. of Computer Science & Engineering, VIGNAN’s NIRULA Institute of technology and science for women, A.P., India

Keywords

Related Articles

Design And Analysis Of Machining (Hydraulic) Fixture For AVTEC Transmission Case Component

In order to have interchangeable parts in mass production, jigs and fixtures play a vital role in manufacturing process. A fixture is a special tool designed for specific purpose and for specific component for operat...

Explication Search Results From Huge Amount Of Published Data

The Internet presents a huge amount of useful information which is usually formatted for its users, which makes it difficult to extract relevant data from various sources. Therefore, the availability of robust, flexi...

A protection PWS system UPS to sum up profiles as per client security prerequisites

Personalized web search has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information d...

Clustered Node Based Load Balancing In Distributed Environment

Cloud computing having tremendous growth on recent years but it is not segregation on shared clouds. Distributed file systems are key building blocks for cloud computing applications based on the Map Reduce programmi...

Acknowledgement based Intrusion-Detection System for MANETS

In the next generation of wireless communication systems, there will be a need for the quick deployment of independent mobile users. notable examples include establishing survivable, efficient, flush communication for...

Download PDF file
  • EP ID EP16527
  • DOI -
  • Views 372
  • Downloads 10

How To Cite

N. Vijaya Bharatha Lakshmi, K. V. S. S. Rama Krishna (2015). Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks. International Journal of Science Engineering and Advance Technology, 3(8), 337-341. https://europub.co.uk/articles/-A-16527