Message Authentication and Source Privacy in Wi-Fi

Wireless fidelity (Wi-Fi) is one of the wireless communication technologies; it will allow transmission of data within a particular range. The critical issues in any wireless transmission will occur due to anonymous users, data loss, corrupted message, and denial of service attack. In a wireless communication, our message can be hacked by anonymous users and they will crack our network and access our data, modify and or delete our data. To avoid these issues we are implementing the message authentication scheme. Message authentication is one of the effective ways to protect our data from unauthorized access and also to handle corrupted messages, while transmitting in wireless networks. Authentication scheme concepts have been developed by generating various key algorithms. There are two approaches—symmetric key and asymmetric key. In asymmetric approach, the public key cryptosystem is implemented using elliptic curve cryptography (ECC) algorithm in wireless sensor networks. It allows us to send bulk messages more than the threshold value. It will solve the threshold and scalability problems. In the proposed system, the symmetric key approach is implemented and it is mainly used in polynomial-based scheme, which will undergo data encryption standard (DES). DES is the best algorithm for symmetric key analysis, so here it is proposed to apply DES algorithm to transfer message from one source to another source through Wi-Fi in a secured manner.

[1]  Jonathan Katz,et al.  Attacking cryptographic schemes based on "perturbation polynomials" , 2009, CCS.

[2]  Rajendra K. Sharma,et al.  Identity-Based Cryptography Techniques and Applications (A Review) , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.

[3]  Vivek Kapoor,et al.  Elliptic curve cryptography , 2008, UBIQ.

[4]  Jongan Park,et al.  The improved data encryption standard (DES) algorithm , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.

[5]  Kannan Balasubramanian Variants of RSA and their cryptanalysis , 2014, 2014 International Conference on Communication and Network Technologies.

[6]  Guiling Wang,et al.  Lightweight and Compromise-Resilient Message Authentication in Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[7]  Rached Tourki,et al.  An FPGA implementation of the AES with fault detection countermeasure , 2013, 2013 International Conference on Control, Decision and Information Technologies (CoDIT).

[8]  Muhammad Salman,et al.  Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system , 2013, 2013 International Conference on QiR.

[9]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[10]  Rainer A. Rueppel,et al.  Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.

[11]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[12]  Janusz Gozdecki,et al.  Wireless link prediction and triggering using modified Ornstein–Uhlenbeck jump diffusion process , 2014, Wirel. Networks.

[13]  Jie Wu,et al.  Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[14]  Lein Harn,et al.  Design of generalised ElGamal type digital signature schemes based on discrete logarithm , 1994 .

[15]  Zheng Yang,et al.  Sensorless Sensing with WiFi , 2015 .