Abstract: In hop by hop message authentication with source
privacy in wireless sensor network, were authentication is effective way to
protect from unauthorized users effected messages from being send through in
wireless sensor networks. Many message authentication schemes have been used to
protect messages but these authentication schemes have the limitations of high
overhead, lack of ability, to node attacks and threshold problem. Message
authentication has a main role in thwarting unauthorized and effected messages
from being sent in networks to save the energy. Many authentication processes
have been implemented to provide message authenticity and verification for
wireless sensor networks. The symmetric-key based approach has complicated key
management and lacks of ways. It is not taken to large numbers of node
compromise attacks since the message sender and the receiver have to share a
secret key. The sender uses shared key to generate a message authentication
code for each transmitted message. The authenticity and integrity of the
message can verified only by the node
using shared secret key, which is generally shared by a group of sensor nodes.
An attacker can easily access the key by occupying a single sensor node. So, It will does not work in multicast networks.
In order to
solve the problem, a secret based for the message authentication scheme was
introduced. The method is similar to a threshold secret sharing, where it is
determined by the degree of the value. This offers information security of the
shared secret key when the number of messages transmitted is less than the
threshold. The middle
nodes verify the authenticity of the message. If
the transmitted messages are larger than the threshold, can be fully recovered.
Keywords: Authentication schemes, multicast networks, key management, etc.