International Journal of Advance Computational Engineering and Networking (IJACEN)
current issues
Volume-7, Issue-2  ( Feb, 2019 )
Past issues
  1. Volume-7, Issue-1  ( Jan, 2019 )
  2. Volume-6, Issue-12  ( Dec, 2018 )
  3. Volume-6, Issue-11  ( Nov, 2018 )
  4. Volume-6, Issue-10  ( Oct, 2018 )
  5. Volume-6, Issue-9  ( Sep, 2018 )
  6. Volume-6, Issue-8  ( Aug, 2018 )
  7. Volume-6, Issue-7  ( Jul, 2018 )
  8. Volume-6, Issue-6  ( Jun, 2018 )
  9. Volume-6, Issue-5  ( May, 2018 )
  10. Volume-6, Issue-4  ( Apr, 2018 )

Statistics report
Jun. 2019
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 73
Paper Published : 1148
No. of Authors : 2870
  Journal Paper

Paper Title
Design And Implementation Of Node To Node Message Authentication Scheme For Wireless Sensor Network

Message authentication plays an eminent role in obstructing unauthorized and corrupted messages from being forwarded in networks to save the sensor energy. Many authentication schemes have been develop to prevent WSN by providing message authenticity and integrity verification. Many of which are based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them have the restrictions of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. Now-a-days Wireless Sensor Networks are being very popular; however one of the main concerns in WSN is its limited resources. One have to look for the availability of resources to generate Message Authentication Code (MAC) keeping in mind the feasibility of method used for the particular sensor network. We propose an authentication scheme which is based on Elliptic curve cryptography (ECC). This scheme enables intermediate nodes to authenticate messages and allows any node to transmit messages without keeping bound on the number of messages; so the scheme does not suffer threshold problem in addition to provide message source privacy. Analysis as well as simulation results prove that our proposed scheme is more competent than the scheme based on polynomial-based approach as it provides less computational and communication overhead under comparable security levels whereas providing message source privacy. Keywords: Wireless sensor networks (WSNs), symmetric-key cryptosystem, public-key cryptosystem, source privacy, Node to Node authentication, simulation

Author - A. W. Motikar, S. R. Pawde

| PDF |
Viewed - 68
| Published on 2015-06-20
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World