A Review on Authentication of Message Through Hop by Hop With Source Privacy in Wireless Sensor Networks Using Optimal Technique

Authentication of message in Wireless Sensor Networks (WSNs) is one of the most effective ways to thwart unauthorized and corrupted messages. For this purpose, there are number of different scheme for message authentication based on cryptography which includes either symmetric-key cryptosystems or public-key cryptosystems. Most of them, have the limitations for high computational and communication overhead with the lack of scalability and resilience to node compromise attacks. There are number of solutions for this problem. Here is one scheme which gives one better way. In this paper, the authors propose a scheme for message authentication which is based on Elliptic Curve Cryptography (ECC).

Subscribe to the Developer Insider Newsletter

From the hottest programming languages to commentary on the Linux OS, get the developer and open source news and tips you need to know. Delivered Tuesdays and Thursdays

Subscribe to the Developer Insider Newsletter

From the hottest programming languages to commentary on the Linux OS, get the developer and open source news and tips you need to know. Delivered Tuesdays and Thursdays

Resource Details

Provided by:
International Journal & Magazine of Engineering, Technology, Management And Research (IJMETMR)
Topic:
Networking
Format:
PDF