Message Authentication and Source Privacy in Wireless Sensor Networks

Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless networks. For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. To address these issues, a polynomial-based scheme was recently introduced.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)
Topic:
Security
Format:
PDF