Skip to main content

On Broadcast Authentication in Wireless Sensor Networks

  • Conference paper
Wireless Algorithms, Systems, and Applications (WASA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 4138))

Abstract

Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as μTESLA and multilevel μTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks because of the delayed message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the μTESLA-like schemes. Several cryptographic building blocks, including Merkle hash tree and ID-based signature scheme, are adopted to minimize the scheme overhead regarding the costs in both computation and communication. A quantitative analysis on energy consumption of the proposed schemes are given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine. IEEE Communications Magazine 40(8), 102–116 (2002)

    Article  Google Scholar 

  2. Akyildiz, I., Kasimoglu, I.: Wireless sensor and actor networks: research challenges. Ad Hoc Networks 2(4), 351–367 (2004)

    Article  Google Scholar 

  3. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: Security protocols for sensor networks. In: Proc. of MobiCom 2001 (July 2001)

    Google Scholar 

  4. Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In: Proc. of NDSS 2003, pp. 263–276 (2003)

    Google Scholar 

  5. Liu, D., Ning, P.: Multi-level mTESLA: Broadcast authentication for distributed sensor networks. ACM TECS 3(4) (2004)

    Google Scholar 

  6. Liu, D., Ning, P., Zhu, S., Jajodia, S.: Practical Broadcast Authentication in Sensor Networks. In: Proc. of MobiQuitous 2005 (July 2005)

    Google Scholar 

  7. Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proceedings of INFOCOM (2003)

    Google Scholar 

  8. Ren, K., Lou, W., Zhang, Y.: LEDS: Providing Location-aware End-to-end Data Security in Wireless Sensor Networks. In: Proc. of IEEE INFOCOM (2006)

    Google Scholar 

  9. Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.: Energy Analysis of Public-Key Cryptography on Small Wireless Devices. In: IEEE PerCom (March 2005)

    Google Scholar 

  10. Du, W., Wang, R., Ning, P.: An Efficient Scheme for Authenticating Public Keys in Sensor Networks. In: Proceedings of MobiHoc, pp. 58–67 (2005)

    Google Scholar 

  11. Crossbow Technology Inc. (2004), http://www.xbow.com/

  12. Aydos, M., Yanik, T., Koc, C.K.: An high-speed ECC-based wireless authentication protocol on an ARM microprocessor. In: Proc. of ACSAC (2000)

    Google Scholar 

  13. Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (April 1980)

    Google Scholar 

  14. Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location based security mechanisms in wireless sensor networks. IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks 24(2), 247–260 (2006)

    Google Scholar 

  15. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  16. NIST, Digital hash standard, Federal Information Processing Standards Publication 180-1 (April 1995)

    Google Scholar 

  17. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  18. National Institure of Standards and Technology: Proposed Federal Information Processing Standard for Digital Signature Standard (DSS). Federal Register 56(169), 42980–42982 (1991)

    Google Scholar 

  19. Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  20. Intel PXA255 Processor Electrical, Mechanical, and Thermal Specification, http://www.intel.com/design/pca/applicationsprocessors/manuals/278780.h

  21. Bertoni, G., Chen, L., Fragneto, P., Harrison, K., Pelosi1, G.: Computing tate pairing on smartcards, White Paper, STMicroelectronics (2005), Available: http://www.st.com/stonline/products/families/smartcard/astibe.htm

  22. Lorincz, K., et al.: Sensor Networks for Emergency Response: Challenges and Opportunities. In: IEEE Pervasive Computing, Special Issue on Pervasive Computing for First Response (2004)

    Google Scholar 

  23. Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ren, K., Zeng, K., Lou, W., Moran, P.J. (2006). On Broadcast Authentication in Wireless Sensor Networks. In: Cheng, X., Li, W., Znati, T. (eds) Wireless Algorithms, Systems, and Applications. WASA 2006. Lecture Notes in Computer Science, vol 4138. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11814856_48

Download citation

  • DOI: https://doi.org/10.1007/11814856_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37189-2

  • Online ISBN: 978-3-540-37190-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics