Call For Paper

Volume 10 Issue 5

May 2024

Submit Paper Here
Download Paper Format
Copyright Form
NEWS & UPDATES
News for Authors:

We have started accepting articles by online means directly through website. Its our humble request to all the researchers to go and check the new method of article submission on below link: Submit Manuscript

Follow us on Social Media:

Dear Researchers, to get in touch with the recent developments in the technology and research and to gain free knowledge like , share and follow us on various social media. Facebook

title

MULTIPLE NODE MESSAGE AUTHENTICATION AND SOURCE PRIVACY IN WIRELESS SENSOR NETWORKS

Author(s):

A. Mummoorthy

Keywords:

MSAM, Key Management, ECC, GECC, Message Verification.

Abstract

Message Sources Anonymity Message authentication is providing various services such as confidentiality, integrity, protection of privacy in wireless sensor network. Message authentication schemes can largely be divided into two methodologies: public-key based and symmetric-key based approaches. The symmetric-key based approach requires complex key management, lacks of scalability, and is not flexible to large numbers of node negotiation attacks since the message sender and the receiver have to share a secret key. However, both symmetric and public-key methods have the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. To address these issues, this paper describes a scalable authentication scheme based on elliptic curve cryptography (ECC). While enabling intermediate nodes authentication, the proposed scheme allows any node to transmit an unlimited number of messages. In addition paper, the GECC scheme can also provide message source privacy and also multiple base station environments are considered.

Other Details

Paper ID: IJSARTV
Published in: Volume : 2, Issue : 5
Publication Date: 5/4/2016

Article Preview




Download Article