Académique Documents
Professionnel Documents
Culture Documents
ABSTRACT:
Wireless sensor networks (WSN) are gaining
more importance in area of research and
development Because of its wide range of
applicationsand usage of less battery power.
Despite making such sensor networks possible,
the very wireless nature of the sensors presents a
number of security threats when deployed for
certain applications like military,surveillances
etc. The problem of security is due to the
wirelessnature of the sensor networks and
constrained nature of resources on the wireless
sensor nodes.Hence the traditional security
architecture used for wireless networks are not
always valid for WSN.Since the nodes are
always placed in a dangerous environment, the
nodes are physically not protected.This is an
added vulnerability to WSN. Number of
schemes have been developed to prevent
unauthorized access of messages. One of such
scheme is Message authentication which is the
one of the most efficient way to prevent
unauthorized and corrupted messages from
being forwarded in wireless sensor networks
(WSNs). There are various methods for
authentication such as Message Authentication
Code, Signedecryption, and Key Aggregate
System .This paper is about investigating
various methods for authentication.Other goals
are to give an introduction to general security in
wireless sensor networks. Each message
authentication methods have their own problems
such as threshold overhead and key management
and computation overhead and scalability. To
solve such problem we developed a new
authentication scheme which uses the elliptic
curve cryptography, in which any node can
transmit n number of message without threshold
problem. This paper is to do survey before
actually implementing it.
Keyword:
Authentication,
elliptic
curve
cryptography, symmetric key, public key.
I.
INTRODUCTION
www.ijsret.org
148
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 3, March 2015
II.
III.
DEFENSE MECHANISMS
www.ijsret.org
149
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 3, March 2015
IV.
LITERATURE SURVEY
www.ijsret.org
150
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 3, March 2015
V.
CONCLUSION
REFERENCES
[1] Perrig, R. Canetti, J. Tygar, and D. Song,
Efficient Authentication and Signing of
Multicast Streams over Lossy Channels, Proc.
IEEE Symp. Security and Privacy, May 2000.
[2] M. Albrecht, C. Gentry, S. Halevi, and J.
Katz, Attacking Cryptographic Schemes Based
on
Perturbation
Polynomials,
Report
2009/098, http://eprint.iacr.org/, 2009.
[3] R. Rivest, A. Shamir, and L. Adleman, A
Method for Obtaining Digital Signatures and
Public-Key Cryptosystems, Comm. ACM, vol.
21, no. 2, pp. 120-126, 1978.
[4] H. Wang, S. Sheng, C. Tan, and Q. Li,
Comparing Symmetric-Key and Public-Key
Based Security Schemes in Sensor Networks: A
Case Study of User Access Control, Proc. IEEE
28th Intl Conf. Distributed Computing Systems
(ICDCS), pp. 11-18, 2008.
www.ijsret.org
151
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 3, March 2015
www.ijsret.org
152