Volume : V, Issue : VIII, August - 2015

SOURCE PRIVACY AND COMPROMISE– RESILIENT MESSAGE AUTHENTICATION IN WIRELESS SENSOR NETWORKS

K. Dhanalakshmi, Dr. K. Kuppusamy

Abstract :

Authentication is any process of system verifies the identity of the user access information. Source privacy is an important to the network security. Network security validate by a provisions and policies. The provisions and policies mainly used to authorize person access the information. Message authentication is a standout amongst the best approaches to defeat unapproved and undermined messages from being sent in wireless sensor systems. Hence, various message verification plans have been produced, based on symmetric–key cryptosystems. The majority of them, not withstanding, have the limits of high computational also correspondence overhead not withstanding absence of adaptability and flexibility to hub trade off assaults.A polynomial–based plan was as introduced. When the quantity of messages transmitted is bigger than this limit, the foe can completely recuperate the polynomial. In this paper,a Blind Signature Scheme is proposed for source privacy. The blind signature schemes with a complexitybased proof of security. Our scheme enables the intermediate nodes to authenticate the message so that all corrupted message can be detected and dropped to conserve the sensor power. The blind signature scheme does not have the threshold problem.

Keywords :

Article: Download PDF   DOI : 10.36106/ijar  

Cite This Article:

K.Dhanalakshmi, Dr.K.Kuppusamy Source Privacy and Compromise- Resilient Message Authentication in Wireless Sensor Networks Indian Journal of Applied Research, Vol.5, Issue : 8 August 2015


Number of Downloads : 650


References :