Peer to Peer Message Verification and Source Security in Ad-Hoc Network

Provided by: International Journal of Engineering Trends and Technology
Topic: Security
Format: PDF
Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks. For this reason so many techniques are available for authentication message in the network. For this purpose the authors are using elliptic curve cryptography technique for message authentication. These techniques have the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. So that to overcome these issue they are introduced certification technique for message authentication.

Find By Topic