A Review on Authentication of Message Through Hop by Hop With Source Privacy in Wireless Sensor Networks Using Optimal Technique

Download Now
Provided by: International Journal & Magazine of Engineering, Technology, Management And Research (IJMETMR)
Topic: Networking
Format: PDF
Authentication of message in Wireless Sensor Networks (WSNs) is one of the most effective ways to thwart unauthorized and corrupted messages. For this purpose, there are number of different scheme for message authentication based on cryptography which includes either symmetric-key cryptosystems or public-key cryptosystems. Most of them, have the limitations for high computational and communication overhead with the lack of scalability and resilience to node compromise attacks. There are number of solutions for this problem. Here is one scheme which gives one better way. In this paper, the authors propose a scheme for message authentication which is based on Elliptic Curve Cryptography (ECC).
Download Now

Find By Topic