Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks

Abstract

security to the data is actually provided by an authentication. Authentication involves a process of confirming an identity. In Wireless sensor networks a lot of message authentication schemes have been developed, based on symmetric-key cryptosystems or public-key cryptosystems. Message authentication is one of the most effective way to prevent illegal and tainted messages from being forwarded in wireless sensor networks (WSNs). For this cause, Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and pliability to node compromise attacks. To address these issues, a Polynomial-based scheme was recently introduced. Though, this scheme and its extensions all have the flaw of a built-in Threshold determined by the degree of the polynomial: when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we suggest a scalable authentication scheme based on Elliptic Curve Cryptography (ECC) with Schnorr Signcryption. While enabling intermediate nodes authentication, our proposed scheme solve the threshold problem. In addition, our scheme can also provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is efficient than the polynomial-based approach in terms of computational and communication overhead under comparable security levels.

Authors and Affiliations

N. Vijaya Bharatha Lakshmi| M.Tech (CSE), VIGNAN’s NIRULA Institute of technology and science for women, A.P., India, K. V. S. S. Rama Krishna| Asst.Professor, Dept. of Computer Science & Engineering, VIGNAN’s NIRULA Institute of technology and science for women, A.P., India

Keywords

Related Articles

RSVP- A Fault Tolerant Mechanism in MPLS Networks

The data transmission over the Internet (IP) takes an increasingly central role in our communications infrastructure. Here there may be the slow convergence of routing protocols after a network failure becomes a grow...

Design And Analysis Of Combined Extrusion Forging Die Behavior Under Thermal Structural Loads

We all know extrusion and forging are two different processes of manufacturing but in recent past researches combined these two process to reduce the production time, production cost etc.Combined extrusion-forging pr...

Access Control and Security Mechanisms On Sensitive Information

Protection preserving module anonymizes the information to gather security necessities and crudeness requirements on predicates set by the entrance control gadget. We make this correspondence as the issue of k-anonym...

Load Harmonizing Standard Based On Cloud Segregating For The Public Cloud

Concept of Harmonizing Load in cloud computing has an important effect on the performance. A cloud computing system which does not use load Harmonizing has numerous drawbacks. Now-a days the usage of internet and rel...

Collective Conviction Based Confidentiality Sustain Endorsement Procedure in Cloud Computing

Cloud computing is consistently growing as a typical for sharing the knowledge over the remote warehousing in a web cloud server. Cloud administrations offers awing enhancements for the purchasers to understand the on...

Download PDF file
  • EP ID EP16527
  • DOI -
  • Views 315
  • Downloads 10

How To Cite

N. Vijaya Bharatha Lakshmi, K. V. S. S. Rama Krishna (2015). Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks. International Journal of Science Engineering and Advance Technology, 3(8), 337-341. https://www.europub.co.uk/articles/-A-16527