Loading

An Efficient Hop-by-Hop Message Authentication Scheme and Secure Location Privacy in Wireless Sensor Networks
Uma Meena1, Anand Sharma2
1Uma Meena, Research Scholar, College of Engineering and Technology, MUST, Lakshmangarh (Rajasthan), India.
2Anand Sharma, Assistant Professor, College of Engineering and Technology, MUST, Lakshmangarh (Rajasthan), India.
Manuscript received on 25 April 2019 | Revised Manuscript received on 01 May 2019 | Manuscript Published on 05 May 2019 | PP: 1-6 | Volume-8 Issue-2S2, January 2019 | Retrieval Number: B10010182S219/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Wireless sensor network in recent days affected with two main research problem such as message authentication and location privacy. This paper present an Elliptic Curve ElGamal Signature Algorithm scheme (ECESA) for message authentication and Euclidean Zigzag Bidirectional Tree (EZBT) for location privacy of both source and sink. ECESA involves three phase: (i) private and public key generation using Elliptic Curve Cryptography (ECC), (ii) ElGamal signature arrangement for effective message encryption and (iii) matching the decrypted result with MD5 hash value for authentication of the authorized person. The most important privacy preserving techniques are the EZBT to send the messages either sink to source or from source to sink with the location privacy scheme. On account of this, the proxy source and sink is selected while using the Euclidean distance technique. Finally, the efficiency of the work has been demonstrated through the simulation results of location privacy and message verification. Then the performance are validated in terms of quality of service (QoS).
Keywords: Elliptic Curve Cryptography, Elgamal Encryption, MD5 Hash Algorithm, Location Privacy, Euclidean Distance, Zigzag Bidirectional Tree.
Scope of the Article: Wireless ad hoc & Sensor Networks