Hop by Hop Authentication for Source Intermediate Node Privacy Protection in Wireless Sensor Network

Provided by: The International Journal of Innovative Research in Computer and Communication Engineering
Topic: Security
Format: PDF
The Internet Key-Exchange (IKE) protocols are the core cryptographic protocols to ensure Internet security, which specify key exchange mechanisms used to establish shared keys for use in the Internet Protocol security (IPsec) standards. For key-exchange over the Internet, both security and privacy are desired. For this reason, many message authentication schemes have been established, created on both symmetric-key cryptosystems and public-key cryptosystems. But it has the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise spells.

Find By Topic