Source Anonymous Message Authentication Based On ECC in Wireless Sensor Networks
نویسندگان
چکیده
Source Anonymous Message authentication (SAMA) is one of the most effective ways to prevent unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs).A scalable authentication scheme based on elliptic curve cryptography (ECC) is introduced to allow any node to transmit an unlimited number of messages without suffering the threshold problem and provides message source privacy. For each message the sending node generates a source anonymous message authenticator for the message. The generation is based on MES scheme on elliptic curves. An efficient key management framework is introduced to ensure isolation of the compromised nodes. ECC reduces computational and communication overhead under comparable security levels while providing message source privacy. Keywords— Hop-by-hop authentication; symmetric key cryptosystem; public-key cryptosystem; source privacy; Modified Elgamal Signature (MES)
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملQuasi Random Deployment Strategy for Reliable Communication Backbones in Wireless Sensor Networks
Topology construction and topology maintenance are significant sub-problems of topology control. Spanning tree based algorithms for topology control are basically transmission range based type construction algorithms. The construction of an effective backbone, however, is indirectly related to the placement of nodes. Also, the dependence of network reliability on the communication path undertak...
متن کاملA Review on Implementation of Message Authentication Scheme for Elliptic Curve Cryptography in Wireless Sensor Networks
Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhe...
متن کاملAvoiding Node Compromise Attacks in Wireless Sensor Network
Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to falsedata injection attacks. In a large-scale sensor network individual sensors are subject to security compromises. Numerous authentication schemes have been proposed in the past for protecting communication authenticity and integrity in wireless sensor networks. Most of them however have f...
متن کاملNew Scheme for Avoiding Node Compromise Attacks in Wireless Sensor Network
Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to falsedata injection attacks. In a large-scale sensor network individual sensors are subject to security compromises. Numerous authentication schemes have been proposed in the past for protecting communication authenticity and integrity in wireless sensor networks. Most of them however have f...
متن کامل