Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 111

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Message authentication is one of the important parameter used to avoid unauthorized accesses in Wireless Sensor Networks (WSN). Because of its importance many authentication schemes were developed based on symmetric key cryptosystems and public key cryptosystems. But they all faced the challenge of high communication and computational overhead. To solve this problems authentication based on ECC was introduced. This authentication scheme is advantageous in terms of computational overhead, memory space utilization and security resilience. Our main aim is to minimize the total power consumption of the nodes in WSN and thereby to save the precious sensor energy. Hence an authentication scheme based on ECDSA was proposed in this paper which is a variant of ElGamal signature scheme recently proposed. This can be used to provide source anonymity along with message authentication. The simulation results show that the proposed scheme is faster and generates smaller signature which adds to the advantage of the system.

Keywords: wireless sensor networks, ECC, source anonymity

Edition: Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Share this Article

How to Cite this Article?

Priya T V, Sreerag B M, "Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB151799, Volume 4 Issue 2, February 2015, 2334 - 2337

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'wireless sensor networks'

Downloads: 153

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 991 - 996

Review on Various Data Gathering Techniques Using Artificial Intelligence

Varsha Kumari, Preeti Sondhi

Share this Article

Downloads: 2 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 914 - 919

Energy Efficient Sensory Data Collection in Wireless Sensor Networks

Liji Varghese

Share this Article

Downloads: 11

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1169 - 1173

Implementation of Long Range Wireless IoT Device for Agriculture Using Multi-Hop Topology Design

Anchla Rajput, Anshul Sarawagi

Share this Article

Similar Articles with Keyword 'ECC'

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1371 - 1376

Optimized Storage and Secured Data Transaction in Cloud Environment using ECC and Huffman Encoding

Saket Nigam, Rekhansh Rao

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this Article

Similar Articles with Keyword 'source anonymity'

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this Article

Downloads: 117

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2035 - 2040

A Framework for Enhancing Source Location Privacy in Wireless Sensor Networks

Parthasaradhi M, B Nagalakshmi, D Venkatesh

Share this Article



Top