Message authentication and source privacy in Wi-Fi

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless fidelity (Wi-Fi) is one of the wireless communication technologies; it will allow transmission of data within a particular range. The critical issues in any wireless transmission will occur due to anonymous users, data loss, corrupted message, and denial of service attack. In a wireless communication, our message can be hacked by anonymous users and they will crack our network and access our data, modify and or delete our data. To avoid these issues we are implementing the message authentication scheme. Message authentication is one of the effective ways to protect our data from unauthorized access and also to handle corrupted messages, while transmitting in wireless networks. Authentication scheme concepts have been developed by generating various key algorithms. There are two approaches—symmetric key and asymmetric key. In asymmetric approach, the public key cryptosystem is implemented using elliptic curve cryptography (ECC) algorithm in wireless sensor networks. It allows us to send bulk messages more than the threshold value. It will solve the threshold and scalability problems. In the proposed system, the symmetric key approach is implemented and it is mainly used in polynomial-based scheme, which will undergo data encryption standard (DES). DES is the best algorithm for symmetric key analysis, so here it is proposed to apply DES algorithm to transfer message from one source to another source through Wi-Fi in a secured manner.

Cite

CITATION STYLE

APA

Gnana Sambandam, K., & Kamalanaban, E. (2016). Message authentication and source privacy in Wi-Fi. In Advances in Intelligent Systems and Computing (Vol. 398, pp. 319–329). Springer Verlag. https://doi.org/10.1007/978-81-322-2674-1_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free