Open Access Open Access  Restricted Access Subscription Access

Message Authentication Protocol for Lifetime Proficient Hash Based Algorithm in Wireless Sensor Networks


Affiliations
1 S.I.E.T, Tumkur, India
2 A.I.T, Tumkur, India
3 Dept of CSE, C.I.T, Gubbi, Tumkur, India
 

Wireless sensor networks are self organized, autonomous, automatic discovery of services, highly scalable, reliable, Infrastructure less service. Mainly applicable in the field of disaster, healthcare. The cryptographic operations such as hash based schemes are more energy consuming (more byte transmitted indirectly consumes more energy). To avoid the energy consumption over a cryptographic operations are design of Message Authentication protocoL for Lifetime enhancement In wireless sensor networks called MALLI, which uses a famous structure of hash algorithm 2AMD-160. To demonstrate that, the execution time and the security achieved by the proposed method are more effective than the MD5 and SHA1.

Keywords

Authentication, Hash function, Cryptography, Security, Wireless Sensor Networks (WSN).
User
Notifications
Font Size

Abstract Views: 123

PDF Views: 1




  • Message Authentication Protocol for Lifetime Proficient Hash Based Algorithm in Wireless Sensor Networks

Abstract Views: 123  |  PDF Views: 1

Authors

N. J. Mallikarjunaswamy
S.I.E.T, Tumkur, India
T. R. Latha Yadav
A.I.T, Tumkur, India
Keshava Prasanna
Dept of CSE, C.I.T, Gubbi, Tumkur, India

Abstract


Wireless sensor networks are self organized, autonomous, automatic discovery of services, highly scalable, reliable, Infrastructure less service. Mainly applicable in the field of disaster, healthcare. The cryptographic operations such as hash based schemes are more energy consuming (more byte transmitted indirectly consumes more energy). To avoid the energy consumption over a cryptographic operations are design of Message Authentication protocoL for Lifetime enhancement In wireless sensor networks called MALLI, which uses a famous structure of hash algorithm 2AMD-160. To demonstrate that, the execution time and the security achieved by the proposed method are more effective than the MD5 and SHA1.

Keywords


Authentication, Hash function, Cryptography, Security, Wireless Sensor Networks (WSN).