International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Message authentication is one of the important parameter used to avoid unauthorized accesses in Wireless Sensor Networks (WSN). Because of its importance many authentication schemes were developed based on symmetric key cryptosystems and public key cryptosystems. But they all faced the challenge of high communication and computational overhead. To solve this problems authentication based on ECC was introduced. This authentication scheme is advantageous in terms of computational overhead, memory space utilization and security resilience. Our main aim is to minimize the total power consumption of the nodes in WSN and thereby to save the precious sensor energy. Hence an authentication scheme based on ECDSA was proposed in this paper which is a variant of ElGamal signature scheme recently proposed. This can be used to provide source anonymity along with message authentication. The simulation results show that the proposed scheme is faster and generates smaller signature which adds to the advantage of the system.

Keywords: wireless sensor networks, ECC, source anonymity

Edition: Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Share this Article

How to Cite this Article?

Priya T V, Sreerag B M, "Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB151799, Volume 4 Issue 2, February 2015, 2334 - 2337

33 PDF Views | 32 PDF Downloads

Download Article PDF

Similar Articles with Keyword 'wireless sensor networks'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1672 - 1679

An Efficient Cluster-Based Power Saving Scheme for Wireless Sensor Networks

Kasa Suguna

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2526 - 2529

A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It

Rohini Divase, S. N. Kini

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 590 - 595

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Cauvery Raju

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1367 - 1370

Energy Efficient Routing Scheme for WSN

Aman Preet Singh, Harsimran Kaur

Share this Article

Similar Articles with Keyword 'ECC'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2086 - 2089

Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography

Anagha P. Zele, Avinash P. Wadhe

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1371 - 1376

Optimized Storage and Secured Data Transaction in Cloud Environment using ECC and Huffman Encoding

Saket Nigam, Rekhansh Rao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 5 - 9

A Trusted Cryptography Key Framework for User Data Storage in Cloud Environment

Yogeswararao Gairaboina, Y. Siva Prasad

Share this Article

Similar Articles with Keyword 'source anonymity'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2035 - 2040

A Framework for Enhancing Source Location Privacy in Wireless Sensor Networks

Parthasaradhi M, B Nagalakshmi, D Venkatesh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this Article



Top