The International Journal Of Engineering And Science (IJES)
A scalable authentication scheme is based on Elliptic Curve Cryptography (ECC), while enabling intermediate nodes authentication, the authors existing scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem. In addition, existing scheme can also provide message source privacy and did not provide destination privacy. In this paper, a novel method, Data-Transparent Authentication (DaTA) without communication overhead, to validate data streams. Their strategy neither embeds a digest to the original data, nor sends any out-of band authentication information. Instead, their paper is based on the timing correlation of data packets between the sender and the receiver.