A Survey Paper on Hop by Hop Message Authentication in Wireless Sensor Network
نویسنده
چکیده
confidentiality and security to the data is actually provided by an authentication . Authentication involves the confident identification of one party by another party or a process of confirming an identity .But now a days there are various methods for authentication such as Message Authentication Code, Signcryption, Key Aggregate System are emerged very rapidly for better security precaution. This paper try to investigate how to provide authentication in wireless sensor networks. Other goals are to give an introduction to general security in wireless sensor networks. As Wireless sensor networks are the point of attention of numerous researchers regarding the security issue in the past several years. Message authentication is one of the most effective way to find out an intruder who can compromise with the nodes and can access to the data and corrupt the data in wireless sensor network. There were various methods have been developed to solve the problem such as symmetric key cryptography and public key cryptography. Each would have their own problems such as threshold overhead and key management and computation overhead and scalability .In order to solve such problem we developed a new authentication scheme using the elliptic curve cryptography .In this scheme any node can transmit n number of message without threshold problem. This paper is to do survey before actually implementing it. Keyword: Authentication, intruder, elliptic curve cryptography , symmetric key, public key
منابع مشابه
A multi-hop PSO based localization algorithm for wireless sensor networks
A sensor network consists of a large number of sensor nodes that are distributed in a large geographic environment to collect data. Localization is one of the key issues in wireless sensor network researches because it is important to determine the location of an event. On the other side, finding the location of a wireless sensor node by the Global Positioning System (GPS) is not appropriate du...
متن کاملImprove range-free localization accuracy in wireless sensor network using DV-hop and zoning
In recent years, wireless sensor networks have drawn great attention. This type of network is composed of a large number of sensor nodes which are able to sense, process and communicate. Besides, they are used in various fields such as emergency relief in disasters, monitoring the environment, military affairs and etc. Sensor nodes collect environmental data by using their sensors and send them...
متن کاملEnergy Efficiency and Reliability in Underwater Wireless Sensor Networks Using Cuckoo Optimizer Algorithm
Energy efficiency and reliability are widely understood to be one of the dominant considerations for Underwater Wireless Sensor Networks (UWSNs). In this paper, in order to maintain energy efficiency and reliability in a UWSN, Cuckoo Optimization Algorithm (COA) is adopted that is a combination of three techniques of geo-routing, multi-path routing, and Duty-Cycle mechanism. In the proposed alg...
متن کاملTarget Tracking Based on Virtual Grid in Wireless Sensor Networks
One of the most important and typical application of wireless sensor networks (WSNs) is target tracking. Although target tracking, can provide benefits for large-scale WSNs and organize them into clusters but tracking a moving target in cluster-based WSNs suffers a boundary problem. The main goal of this paper was to introduce an efficient and novel mobility management protocol namely Target Tr...
متن کاملAn Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks
LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...
متن کامل