International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 103

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015


Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane [2] | S. N. Shelke [2]


Abstract: Message authentication is one of the most effective ways to defeat unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). Wireless Sensor Networks (WSN) are being very popular day by day, however one of the main concern in WSN is its limited resources. One have to look to the resources to generate Message Authentication Code (MAC) keeping in mind the feasibility of method used for the sensor network at hand. For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we propose a scalable authentication scheme based on elliptic curve cryptography (ECC). While enabling intermediate nodes authentication, our proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem.


Keywords: Hop-by-hop authentication, symmetric-key cryptosystem, public-key cryptosystem, source privacy, simulation, wireless sensor networks WSNs, distributed algorithm, decentralized control


Edition: Volume 4 Issue 11, November 2015,


Pages: 2223 - 2228


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Vaishali Kisanrao Gulhane, S. N. Shelke, "Survey on Wireless Sensor Network for Message Authentication and Source Privacy", International Journal of Science and Research (IJSR), Volume 4 Issue 11, November 2015, pp. 2223-2228, https://www.ijsr.net/get_abstract.php?paper_id=NOV151684

Similar Articles with Keyword 'simulation'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi [3] | Dr. S. K. Srivatsa

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 672 - 675

Increasing the Trust Factor in Cognitive Radio Networks Driven by Software Defined Radio

Shashank Dhananjaya | Yuvaraju B N

Share this Article
Top