alexa Efficient Techniques for Message Authentication and Communication for Wireless Sensor Network | Abstract
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Special Issue Article Open Access

Abstract

The Radio Frequency Identification and Wireless Sensor Networks exemplify computationally constrained environments, where the compact nature of the components cannot support complex computations or high communication overhead. On the other hand, such components should support security applications such as message integrity, authentication, and time stamping. The later are efficiently implemented by Hash Message Authentication Codes (HMAC). Current approved implementations of HMAC require resources that cannot be supported in constrained components. The stream ciphering is used in the HMAC mechanism. The same seed based key generation is used in the system. The proposed system is designed to provide authentication, confidentiality and message integrity for wireless sensor node communication. The public key cryptography technique is used to secure the key transfer process. The session-based key is used for message communication. The elliptic curve cryptography technique is used for the key distribution process. The message communication is secured using the RC4 (Rivest Cipher) algorithm. The secure hashing algorithm is used for the message integrity analysis. The Java in Simulation Time (JiST) simulation environment is used for the system development.

To read the full article Peer-reviewed Article PDF image | Peer-reviewed Full Article image

Author(s): M.Santhi, D.Suganthi

Keywords

ECC, Data integrity, Data confidentiality, SHA., Cellular Communication,Cellular Communication,Cellular Communication

Share This Page

Additional Info

Loading
Loading Please wait..
 
 
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords