Privacy in wireless sensor networks using ring signature

The veracity of a message from a sensor node must be verified in order to avoid a false reaction by the sink. This verification requires the authentication of the source node. The authentication process must also preserve the privacy such that the node and the sensed object are not endangered. In th...

Full description

Bibliographic Details
Main Authors: Ashmita Debnath, Pradheepkumar Singaravelu, Shekhar Verma
Format: Article
Language:English
Published: Elsevier 2014-07-01
Series:Journal of King Saud University: Computer and Information Sciences
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S1319157813000980