Efficient and Secure Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks

Provided by: Creative Commons
Topic: Security
Format: PDF
Security to the data is actually provided by an authentication. Authentication involves a process of confirming an identity. In Wireless sensor networks a lot of message authentication schemes have been developed, based on symmetric-key cryptosystems or public-key cryptosystems. Message authentication is one of the most effective way to prevent illegal and tainted messages from being forwarded in Wireless Sensor Networks (WSNs). For this cause, Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and pliability to node compromise attacks.

Find By Topic