Practical broadcast authentication protocol for sensor networks

被引:0
|
作者
Du Z.-Q. [1 ]
Shen Y.-L. [2 ]
Ma J.-F. [1 ]
Zhou L.-H. [1 ]
机构
[1] School of Computer Science and Technology, Xidian Univ.
[2] Ministry of Education Key Lab. of Computer Network and Information Security, Xidian Univ.
关键词
μTESLA; Broadcast authentication; Network security; Wireless sensor networks;
D O I
10.3969/j.issn.1001-2400.2010.02.022
中图分类号
学科分类号
摘要
Broadcast authentication is one of the most important security primitive services in Sensor Networks. With more and more senders in a network, costs of Tree-based μTESLA are rising rapidly, which limits strictly the scale of networks employing it. Aiming at eliminating such a limit, this paper presents a μTPCT-based broadcasting authentication protocol which mainly rests on constructions of μTPC (μTESLA Parameters Hash Chain) and μTPCT (μTPC Merkle Hash Tree). Analysis and experiments have shown that our proposed protocol not only possesses both excellent resistance to DoS attacks against the distribution of μTESLA parameters and the ability to revoke authenticating capabilities of compromised nodes instantly, but also greatly outperforms the Tree-based μTESLA by largely reducing the cost of computation, communication, and storage needed, making it more applicable to large-scale sensor networks.
引用
收藏
页码:305 / 310+325
相关论文
共 18 条
  • [1] Jens-Matthias B., Alban H., Osman U., A secure and resilient WSN roadside architecture for intelligent transport systems, Proceedings of the First ACM Conference on Wireless Network Security, pp. 161-171, (2008)
  • [2] Huo H., Zhang H., Zhang S., Research on a wireless sensor network used in railway track inspection, Journal of Xidian University, 34, 1, pp. 35-38, (2007)
  • [3] Zhang Y.C., Liu W., Lou W.J., Et al., Location-based compromise tolerant security mechanisms in wireless sensor networks, Areas Communication Special Issue Security Wireless Ad Hoc Networks, 24, 2, pp. 247-260, (2006)
  • [4] Dong Q., Liu D.G., Ning P., Pre-authentication filters: Providing dos resistance for signature-based broadcast authentication in sensor networks, Proceedings of the First ACM Conference on Wireless Network Security, pp. 2-12, (2008)
  • [5] Ren K., Zeng K., Lou W.J., Et al., On broadcast authentication in wireless sensor networks, IEEE Transactions on Wireless Communications, 6, 11, pp. 4136-4144, (2007)
  • [6] Ayday E., Delgosha F., Fekri F., Efficient broadcast authentication for wireless sensor networks, Networking Technologies for Software Define Radio Networks, 2nd IEEE Workshop, pp. 61-62, (2007)
  • [7] Chang S.M., Shieh S., Lin W.W., Et al., An efficient broadcast authentication scheme in wireless sensor networks, Proceedings of the ACM Symposium on Information, Computer and Communications Security ASIACCS'06, pp. 311-320, (2006)
  • [8] Perrig A., Szewczyk R., Wen V., Et al., SPINS: Security protocols for sensor networks, Wireless Networks Journal, 8, 5, pp. 521-534, (2002)
  • [9] Liu D.G., Ning P., Multi-level μTESLA: Broadcast authentication for distributed sensor networks, ACM Trans in Embedded Computing Systems (TECS), 3, 4, pp. 800-836, (2004)
  • [10] Liu D.G., Ning P., Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, Proceedings of the 10th Annual Network and Distributed System Security Symposium (NDSS'03), pp. 263-276, (2003)