Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Source Privacy Using SAMA Architecture in Wireless Sensor Networks


Affiliations
1 KMP College of Engineering, Perumbavoor, Ernakulam, India
     

   Subscribe/Renew Journal


Message authentication is among the most reliable solutions to curb unauthorized along with corrupted communications from currently being sent within wireless sensor networks (WSNs). In this particular paper, we propose a scalable authentication structure dependant on elliptic curve cryptography in order to transfer a good unrestricted volume of communications with no suffering the actual threshold issue. Moreover, each of our structure also can produce information source privacy. Our recommended structure is usually extremely effective versus polynomial-based technique with regard to computational along with connection cost within identical security amounts whilst giving information source privacy.


Keywords

Source Privacy, Message Encryption, Elliptic Curve, Embedding Plain Text.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 160

PDF Views: 3




  • Source Privacy Using SAMA Architecture in Wireless Sensor Networks

Abstract Views: 160  |  PDF Views: 3

Authors

K. G. Vishnu
KMP College of Engineering, Perumbavoor, Ernakulam, India
Chinchu Jacob
KMP College of Engineering, Perumbavoor, Ernakulam, India

Abstract


Message authentication is among the most reliable solutions to curb unauthorized along with corrupted communications from currently being sent within wireless sensor networks (WSNs). In this particular paper, we propose a scalable authentication structure dependant on elliptic curve cryptography in order to transfer a good unrestricted volume of communications with no suffering the actual threshold issue. Moreover, each of our structure also can produce information source privacy. Our recommended structure is usually extremely effective versus polynomial-based technique with regard to computational along with connection cost within identical security amounts whilst giving information source privacy.


Keywords


Source Privacy, Message Encryption, Elliptic Curve, Embedding Plain Text.