MULTIPLE NODE MESSAGE AUTHENTICATION AND SOURCE PRIVACY IN WIRELESS SENSOR NETWORKS |
Author(s): |
A. Mummoorthy |
Keywords: |
MSAM, Key Management, ECC, GECC, Message Verification. |
Abstract |
Message Sources Anonymity Message authentication is providing various services such as confidentiality, integrity, protection of privacy in wireless sensor network. Message authentication schemes can largely be divided into two methodologies: public-key based and symmetric-key based approaches. The symmetric-key based approach requires complex key management, lacks of scalability, and is not flexible to large numbers of node negotiation attacks since the message sender and the receiver have to share a secret key. However, both symmetric and public-key methods have the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. To address these issues, this paper describes a scalable authentication scheme based on elliptic curve cryptography (ECC). While enabling intermediate nodes authentication, the proposed scheme allows any node to transmit an unlimited number of messages. In addition paper, the GECC scheme can also provide message source privacy and also multiple base station environments are considered. |
Other Details |
Paper ID: IJSARTV Published in: Volume : 2, Issue : 5 Publication Date: 5/4/2016 |
Article Preview |
Download Article |