Abstract
Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as μTESLA and multilevel μTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks because of the delayed message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the μTESLA-like schemes. Several cryptographic building blocks, including Merkle hash tree and ID-based signature scheme, are adopted to minimize the scheme overhead regarding the costs in both computation and communication. A quantitative analysis on energy consumption of the proposed schemes are given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine. IEEE Communications Magazine 40(8), 102–116 (2002)
Akyildiz, I., Kasimoglu, I.: Wireless sensor and actor networks: research challenges. Ad Hoc Networks 2(4), 351–367 (2004)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: Security protocols for sensor networks. In: Proc. of MobiCom 2001 (July 2001)
Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In: Proc. of NDSS 2003, pp. 263–276 (2003)
Liu, D., Ning, P.: Multi-level mTESLA: Broadcast authentication for distributed sensor networks. ACM TECS 3(4) (2004)
Liu, D., Ning, P., Zhu, S., Jajodia, S.: Practical Broadcast Authentication in Sensor Networks. In: Proc. of MobiQuitous 2005 (July 2005)
Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proceedings of INFOCOM (2003)
Ren, K., Lou, W., Zhang, Y.: LEDS: Providing Location-aware End-to-end Data Security in Wireless Sensor Networks. In: Proc. of IEEE INFOCOM (2006)
Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.: Energy Analysis of Public-Key Cryptography on Small Wireless Devices. In: IEEE PerCom (March 2005)
Du, W., Wang, R., Ning, P.: An Efficient Scheme for Authenticating Public Keys in Sensor Networks. In: Proceedings of MobiHoc, pp. 58–67 (2005)
Crossbow Technology Inc. (2004), http://www.xbow.com/
Aydos, M., Yanik, T., Koc, C.K.: An high-speed ECC-based wireless authentication protocol on an ARM microprocessor. In: Proc. of ACSAC (2000)
Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (April 1980)
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location based security mechanisms in wireless sensor networks. IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks 24(2), 247–260 (2006)
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
NIST, Digital hash standard, Federal Information Processing Standards Publication 180-1 (April 1995)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
National Institure of Standards and Technology: Proposed Federal Information Processing Standard for Digital Signature Standard (DSS). Federal Register 56(169), 42980–42982 (1991)
Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)
Intel PXA255 Processor Electrical, Mechanical, and Thermal Specification, http://www.intel.com/design/pca/applicationsprocessors/manuals/278780.h
Bertoni, G., Chen, L., Fragneto, P., Harrison, K., Pelosi1, G.: Computing tate pairing on smartcards, White Paper, STMicroelectronics (2005), Available: http://www.st.com/stonline/products/families/smartcard/astibe.htm
Lorincz, K., et al.: Sensor Networks for Emergency Response: Challenges and Opportunities. In: IEEE Pervasive Computing, Special Issue on Pervasive Computing for First Response (2004)
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ren, K., Zeng, K., Lou, W., Moran, P.J. (2006). On Broadcast Authentication in Wireless Sensor Networks. In: Cheng, X., Li, W., Znati, T. (eds) Wireless Algorithms, Systems, and Applications. WASA 2006. Lecture Notes in Computer Science, vol 4138. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11814856_48
Download citation
DOI: https://doi.org/10.1007/11814856_48
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37189-2
Online ISBN: 978-3-540-37190-8
eBook Packages: Computer ScienceComputer Science (R0)