2015
DOI: 10.1007/978-3-319-12012-6_87
|View full text |Cite
|
Sign up to set email alerts
|

Authentication of the Message through Hop-by-Hop and Secure the Source Nodes in Wireless Sensor Networks

Abstract: Abstract. Message authentication is the most effective way to protect the data from unauthorized access and corrupted messages being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Some have the limitations of high computational and communication overhead and lack of scalability to node compromise attacks. To address these issues, a polynomial-based scheme was recentl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 8 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?