Privacy in wireless sensor networks using ring signature

The veracity of a message from a sensor node must be verified in order to avoid a false reaction by the sink. This verification requires the authentication of the source node. The authentication process must also preserve the privacy such that the node and the sensed object are not endangered. In th...

Full description

Bibliographic Details
Published in:Journal of King Saud University: Computer and Information Sciences
Main Authors: Ashmita Debnath, Pradheepkumar Singaravelu, Shekhar Verma
Format: Article
Language:English
Published: Springer 2014-07-01
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S1319157813000980