Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015
Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
Message authentication is one of the most effective ways to defeat unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). Wireless Sensor Networks (WSN) are being very popular day by day, however one of the main concern in WSN is its limited resources. One have to look to the resources to generate Message Authentication Code (MAC) keeping in mind the feasibility of method used for the sensor network at hand.For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we propose a scalable authentication scheme based on elliptic curve cryptography (ECC). While enabling intermediate nodes authentication, our proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem.
Keywords: Hop-by-hop authentication, symmetric-key cryptosystem, public-key cryptosystem, source privacy, simulation, wireless sensor networks WSNs, distributed algorithm, decentralized control
Edition: Volume 4 Issue 11, November 2015
Pages: 2223 - 2228
How to Cite this Article?
Vaishali Kisanrao Gulhane, S. N. Shelke, "Survey on Wireless Sensor Network for Message Authentication and Source Privacy", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151684, Volume 4 Issue 11, November 2015, 2223 - 2228
113 PDF Views | 92 PDF Downloads
Similar Articles with Keyword 'Hop-by-hop authentication'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2223 - 2228Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 428 - 431Message Authentication and Source Privacy in Wireless Networks
Vaishali Kisanrao Gulhane, S. N. Shelke
Similar Articles with Keyword 'symmetric-key cryptosystem'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2223 - 2228Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 428 - 431Message Authentication and Source Privacy in Wireless Networks
Vaishali Kisanrao Gulhane, S. N. Shelke
Similar Articles with Keyword 'public-key cryptosystem'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2223 - 2228Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1087 - 1091Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud
Kavitha K, Manjula R
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 924 - 926An Optimised Key cryptography for Securing Cloud Data Sharing and Storage Environment
Viharika Sudanagunta, K. Narayana Rao
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1448 - 1452Efficient Data Sharing in Cloud Medium with Key Aggregate Cryptosystem
C. Suganya, A. Sangeetha
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 428 - 431Message Authentication and Source Privacy in Wireless Networks
Vaishali Kisanrao Gulhane, S. N. Shelke
Similar Articles with Keyword 'source privacy'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2223 - 2228Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 428 - 431Message Authentication and Source Privacy in Wireless Networks
Vaishali Kisanrao Gulhane, S. N. Shelke
Similar Articles with Keyword 'simulation'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 530 - 533QoS Provisioning Using Latency for IPV6
T. Vengatesh, Dr. S. Thabasu Kannan
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1906 - 1909TBEL Protocol for Sensor Localization in WSN & MANET
Sheethal K, Sathisha M. S
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1936 - 1939Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way
D. Hemalatha, R. Arunudaya
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1742 - 1745A Novel Routing Based Path Planning Using RSU and OBU for Time Critical Information Sharing
Dr. Raafiya Gulmeher, Javeriya Shabnam
Similar Articles with Keyword 'wireless sensor networks WSNs'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2223 - 2228Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 1884 - 1888A Study on Wireless Sensor Network and Routing Strategies
Aayushi Chaudhary, Manju
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 190 - 196A Geographic Routing Oriented Sleep Scheduling Algorithm in Duty-Cycled Mobile Sensor Networks Methodology
Pratik R. Mantri, Mahip M. Bartere
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 326 - 330An Energy-Efficient Algorithm Integrated with Target Tracking and Mobile Sensor Navigation
Amrutha Kakkoth, Rijin I K
Similar Articles with Keyword 'distributed algorithm'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2725 - 2726A Survey of Location Based Services Caching for Efficient Data Access in DTN
Trupti Gedam, Archana D. Shinde
Informative Article, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 74 - 79Mobile Ad hoc Network
R. Marutha Veni, R. Latha
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2223 - 2228Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2993 - 2996Survey Paper on Load Rebalancing for Distributed File Systems in Clouds
Juhi Shah, D. N. Rewadkar
Similar Articles with Keyword 'decentralized control'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2223 - 2228Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 428 - 431Message Authentication and Source Privacy in Wireless Networks
Vaishali Kisanrao Gulhane, S. N. Shelke