An Efficient Hop-by-Hop Message Authentication Scheme and Secure Location Privacy in Wireless Sensor Networks
Uma Meena1, Anand Sharma2

Manuscript received on 08 February 2019 | Revised Manuscript received on 21 February 2019 | Manuscript Published on 04 March 2019 | PP: 408-413 | Volume-7 Issue-5S2 January 2019 | Retrieval Number: ES2074017519/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Wireless sensor network in recent days affected with two main research problem such as message authentication and location privacy. This paper present an Elliptic Curve ElGamal Signature Algorithm scheme (ECESA) for message authentication and Euclidean Zigzag Bidirectional Tree (EZBT) for location privacy of both source and sink. ECESA involves three phase: (i) private and public key generation using Elliptic Curve Cryptography (ECC), (ii) ElGamal signature arrangement for effective message encryption and (iii) matching the decrypted result with MD5 hash value for authentication of the authorized person. The most important privacy preserving techniques are the EZBT to send the messages either sink to source or from source to sink with the location privacy scheme. On account of this, the proxy source and sink is selected while using the Euclidean distance technique. Finally, the efficiency of the work has been demonstrated through the simulation results of location privacy and message verification. Then the performance are validated in terms of quality of service (QoS).
Keywords: Elliptic Curve Cryptography, ElGamal Encryption, MD5 Hash Algorithm, Location Privacy, Euclidean Distance, Zigzag Bidirectional Tree.
Scope of the Article: Wireless ad hoc & Sensor Networks