- Mydukur ,Andhra Pradesh
Hop by Hop message authentication and source privacy in wireless sensor networks.
Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks.
To address these issues, a polynomial-based scheme was recently introduced. when the number of messages transmitted is larger than this threshold, we propose a scalable authentication scheme based on elliptic curve cryptography (ECC). While enabling intermediate nodes authentication, our proposed system allows any node to transmit an unlimited number of messages without suffering the threshold problem. Also it provides message privacy