Review on Design and Implementation of Hop to Hop Message Authentication and Source Privacy in Wireless Sensor Networks
IJARCCE - Computer and Communication Engineering

Dipika R. Bisne, Mr. Punesh U. Tembhare
<span title="2015-01-30">2015</span> <i title="Tejass Publisheers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ezm4lr6uezhi5pfgr6xkdexmgy" style="color: black;">IJARCCE</a> </i> &nbsp;
In hop by hop message authentication with source privacy in wireless sensor network, were authentication is effective way to protect from unauthorized users effected messages from being send through in wireless sensor networks. Many message authentication schemes have been used to protect messages but these authentication schemes have the limitations of high overhead, lack of ability, to node attacks and threshold problem. Message authentication has a main role in thwarting unauthorized and
more &raquo; ... cted messages from being sent in networks to save the energy. Many authentication processes have been implemented to provide message authenticity and verification for wireless sensor networks. The symmetric-key based approach has complicated key management and lacks of ways. It is not taken to large numbers of node compromise attacks since the message sender and the receiver have to share a secret key. The sender uses shared key to generate a message authentication code for each transmitted message. The authenticity and integrity of the message can verified only by the node using shared secret key, which is generally shared by a group of sensor nodes. An attacker can easily access the key by occupying a single sensor node. So, It will does not work in multicast networks. In order to solve the problem, a secret based for the message authentication scheme was introduced. The method is similar to a threshold secret sharing, where it is determined by the degree of the value. This offers information security of the shared secret key when the number of messages transmitted is less than the threshold. The middle nodes verify the authenticity of the message. If the transmitted messages are larger than the threshold, can be fully recovered.
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17148/ijarcce.2015.4136">doi:10.17148/ijarcce.2015.4136</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7zrtwprfmjgdblzmqyqe6fsjua">fatcat:7zrtwprfmjgdblzmqyqe6fsjua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602070232/https://ijarcce.com/upload/2015/january/IJARCCE3F.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/87/50/8750633583e487292422e84a91215dae9ebff3cf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17148/ijarcce.2015.4136"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>