A Constrained Function Based Message Authentication Scheme for Sensor Networks

Author(s):  
Chia-Mu Yu ◽  
Chun-Shien Lu ◽  
Sy-Yen Kuo
2011 ◽  
Vol 6 (2) ◽  
pp. 407-425 ◽  
Author(s):  
Chia-Mu Yu ◽  
Yao-Tung Tsou ◽  
Chun-Shien Lu ◽  
Sy-Yen Kuo

Author(s):  
Sundarrajan M.

In categorized sensor network deployment, many applications uses different sensor nodes and communicate with sensor nodes. In WSN peer-to-peer sensor network consists of hundreds to several thousand sensor nodes connect locally with neighboring nodes and send data over the network. However, sensor networks meet challenges to provide security using Symmetric public key cryptosystem. Sensor networks are also vulnerable to several node attacks by an adversary. For this reason, message authentication schemes are required to prevent such node attacks from an attacker. This paper focuses on scalable Message authentication scheme, it is proposed based on Blue Fish Cryptography (BFC). The message authentication scheme proposed also provides source assurance of security.


2014 ◽  
Vol 41 (5) ◽  
pp. 2559-2564 ◽  
Author(s):  
Joseph K. Liu ◽  
Tsz Hon Yuen ◽  
Man Ho Au ◽  
Willy Susilo

Sign in / Sign up

Export Citation Format

Share Document