Abstract: In hop by hop message authentication with source privacy in wireless sensor network, were authentication is effective way to protect from unauthorized users effected messages from being send through in wireless sensor networks. Many message authentication schemes have been used to protect messages but these authentication schemes have the limitations of high overhead, lack of ability, to node attacks and threshold problem. Message authentication has a main role in thwarting unauthorized and effected messages from being sent in networks to save the energy. Many authentication processes have been implemented to provide message authenticity and verification for wireless sensor networks. The symmetric-key based approach has complicated key management and lacks of ways. It is not taken to large numbers of node compromise attacks since the message sender and the receiver have to share a secret key. The sender uses shared key  to generate a message authentication code for each transmitted message. The authenticity and integrity of the message can  verified only by the node using shared secret key, which is generally shared by a group of sensor nodes. An attacker can easily access the key by occupying a single sensor node. So, It will does not work in multicast networks.

In order to solve the problem, a secret based for the message authentication scheme was introduced. The method is similar to a threshold secret sharing, where it is determined by the degree of the value. This offers information security of the shared secret key when the number of messages transmitted is less than the threshold. The middle  nodes verify the authenticity of the message. If the transmitted messages are larger than the threshold, can be fully recovered.

 

Keywords: Authentication schemes, multicast networks, key management, etc.