Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

被引:0
|
作者
Li, Yun [1 ]
Li, Jian [1 ]
Ren, Jian [1 ]
Wu, Jie [2 ]
机构
[1] Michigan State Univ, Dept Elect & Comp Engn, E Lansing, MI 48824 USA
[2] Temple Univ, Dept Informat & Comp Sci, Philadelphia, PA 19122 USA
关键词
Hop-by-hop authentication; symmetric-key cryptosystem; public-key cryptosystem; source privacy; SCHEMES;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Message authentication is one of the most effective ways to thwart unauthorized and corrupted traffic from being forwarded in wireless sensor networks (WSNs). To provide this service, a polynomial-based scheme was recently introduced. However, this scheme and its extensions all have the weakness of a built-in threshold determined by the degree of the polynomial: when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we propose a scalable authentication scheme based on elliptic curve cryptography (ECC). While enabling intermediate node authentication, our proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem. In addition, our scheme can also provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is more efficient than the polynomial-based approach in terms of communication and computational overhead under comparable security levels while providing message source privacy.
引用
收藏
页码:3071 / 3075
页数:5
相关论文
共 50 条
  • [1] Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
    Li, Jian
    Li, Yun
    Ren, Jian
    Wu, Jie
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (05) : 1223 - 1232
  • [2] Authentication of the Message through Hop-by-Hop and Secure the Source Nodes in Wireless Sensor Networks
    Kumar, B. Anil
    Rao, N. Bhaskara
    Sunitha, M. S.
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 785 - 791
  • [3] Hop-by-Hop Traceback in Wireless Sensor Networks
    Siddiqui, Muhammad Shoaib
    Amin, Syed Obaid
    Hong, Choong Seon
    [J]. IEEE COMMUNICATIONS LETTERS, 2012, 16 (02) : 242 - 245
  • [4] Upstream Hop-by-Hop Congestion Control in Wireless Sensor Networks
    Wang, Guangxue
    Liu, Kai
    [J]. 2009 IEEE 20TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2009, : 1406 - 1410
  • [5] A hop-by-hop reliability support scheme for wireless sensor networks
    Lee, H
    Ko, Y
    Lee, D
    [J]. FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 431 - +
  • [6] Hop-by-hop Control for Reliable Data Dissemination in Wireless Sensor Networks
    Park, Hosung
    Kim, Taehee
    Lee, Jeongcheol
    Jin, Min-Sook
    Kim, Sang-Ha
    [J]. ISADS 2009: 2009 INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2009, : 317 - 322
  • [7] Hop-by-Hop Congestion Control and Load Balancing in Wireless Sensor Networks
    Basaran, Can
    Kang, Kyoung-Don
    Suzer, Mehmet H.
    [J]. IEEE LOCAL COMPUTER NETWORK CONFERENCE, 2010, : 448 - 455
  • [8] Partial Energy-Efficient Hop-by-Hop Retransmission in Wireless Sensor Networks
    Costa, Daniel G.
    Guedes, Luiz Affonso
    Vasques, Francisco
    Portugal, Paulo
    [J]. 2013 11TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2013, : 146 - 151
  • [9] Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
    Zhu, Sencun
    Setia, Sanjeev
    Jajodia, Sushil
    Ning, Peng
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2007, 3 (03)
  • [10] An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    Zhu, S
    Setia, S
    Jajodia, S
    Ning, P
    [J]. 2004 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2004, : 259 - 271