Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
security to the data is actually provided by an authentication. Authentication involves a process of confirming an identity. In Wireless sensor networks a lot of message authentication schemes have been developed, based on symmetric-key cryptosystems or public-key cryptosystems. Message authentication is one of the most effective way to prevent illegal and tainted messages from being forwarded in wireless sensor networks (WSNs). For this cause, Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and pliability to node compromise attacks. To address these issues, a Polynomial-based scheme was recently introduced. Though, this scheme and its extensions all have the flaw of a built-in Threshold determined by the degree of the polynomial: when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we suggest a scalable authentication scheme based on Elliptic Curve Cryptography (ECC) with Schnorr Signcryption. While enabling intermediate nodes authentication, our proposed scheme solve the threshold problem. In addition, our scheme can also provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is efficient than the polynomial-based approach in terms of computational and communication overhead under comparable security levels.
Authors and Affiliations
N. Vijaya Bharatha Lakshmi| M.Tech (CSE), VIGNAN’s NIRULA Institute of technology and science for women, A.P., India, K. V. S. S. Rama Krishna| Asst.Professor, Dept. of Computer Science & Engineering, VIGNAN’s NIRULA Institute of technology and science for women, A.P., India
A Novel Rescue System At Congested Traffic Cities
In this paper, I have presented to overcome major problems in modern urban areas which have caused much uncomfortable for the ambulance due to the traffic. Moreover road accidents in the city have been nonstop and to...
Reducing Cost of Cloud Bandwidth using Prediction-Based System
In Cloud Computing environment we designed and present PACK (Predictive ACKs), end to end traffic redundancy elimination (TRE) system called for cloud computing customers.. PACK’s main advantage is its capability o...
A Data De-duplication Procedure To Protect The Data Security
Data de-duplication carry a lot of benefits, security and privacy concerns arise as users’ sensitive data are vulnerable to both inside and outside attacks. Traditional encryption, while as long as data confidential...
Speech Emotion Verification Using Emotion Variance And Discriminate Scale Frequency Maps
The problems of emotion variances and emotion blending are solved using the emotion verification system. In this methodology consists of two parts. The first part, feature extraction is used to lessen the huge input...
Message Endorsement and Informant Confidentiality In Wireless Set of Connections
Privacy and security to the information is really given by verification. Verification includes the certain distinguishing proof of one gathering by another gathering or a procedure of affirming a personality .But now...