Abstract

In wireless sensor networks(WSN) ,authentication of messages is the highly important function in preventing threats from un wanted , un authorized and corrupt messages from being sent. There are various message verification and authentication methods have been proposed as well as developed based on cryptography technology such as symmetric key cryptographic systems or public-key cryptographic systems. Also there are many different techniques available based on polynomial-based schemes, elliptic curve cryptography (ECC) and so on. All the above said methods have its own merits and demerits. In this research work a new method of authenticating the message by its IP and MAC address (together encrypting) and analysing the encrypted message to find the authenticity of the message and the node which has sent the message at collecting node will be carried out.

Highlights

  • Due to need for message authentication, to prevent threats of un authentified and morphed messages from being transferred in wireless sensor networks (WSN)[1], many message authorization methods have been formulated and developed which were related cryptographic technology

  • Symmetric key cryptographic systems or public-key cryptographic systems and there are many different techniques available based on polynomial-based schemes, elliptic curve cryptography (ECC)[2] and so on

  • In this research work a new method of authenticating the message by its IP and MAC address and analysing the encrypted message to find the authenticity of the message and the node which has sent the message at collecting node has to be carried out

Read more

Summary

INTRODUCTION

Due to need for message authentication, to prevent threats of un authentified and morphed messages from being transferred in wireless sensor networks (WSN)[1], many message authorization methods have been formulated and developed which were related cryptographic technology. Symmetric key Cryptography: In this Cryptographic system [5], [6] both the sender and receiver of the message transformation will share a unique, similar key which will be used for both encryption as well as decryption of the message These cryptographic systems are simple and fastest , but the important drawback is , the exchange of key in a secured manner between both sender and receiver. The secured unreadable format of data will be transformed (decrypted) into original readable format of data using common key which was used for encryption. Advanced encryption standard (AES): This is a symmetric 128-bit block text encryption process invented by Belgian Cryptographic experts Joan Daemen and Vincent Rijmen[11],[12]. The minimum number of bits will be 128-bits and the maximum number of bits will be 256-bits

Asymmetric cryptography
Methodology
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call