Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

被引:0
|
作者
Li, Yun [1 ]
Li, Jian [1 ]
Ren, Jian [1 ]
Wu, Jie [2 ]
机构
[1] Michigan State Univ, Dept Elect & Comp Engn, E Lansing, MI 48824 USA
[2] Temple Univ, Dept Informat & Comp Sci, Philadelphia, PA 19122 USA
关键词
Hop-by-hop authentication; symmetric-key cryptosystem; public-key cryptosystem; source privacy; SCHEMES;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Message authentication is one of the most effective ways to thwart unauthorized and corrupted traffic from being forwarded in wireless sensor networks (WSNs). To provide this service, a polynomial-based scheme was recently introduced. However, this scheme and its extensions all have the weakness of a built-in threshold determined by the degree of the polynomial: when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we propose a scalable authentication scheme based on elliptic curve cryptography (ECC). While enabling intermediate node authentication, our proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem. In addition, our scheme can also provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is more efficient than the polynomial-based approach in terms of communication and computational overhead under comparable security levels while providing message source privacy.
引用
收藏
页码:3071 / 3075
页数:5
相关论文
共 50 条
  • [21] Hop-by-Hop Multicast Transport for Mobile Ad Hoc Wireless Networks
    Pandey, Manoj
    Zappala, Daniel
    [J]. 2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 463 - 468
  • [22] Hop-by-hop Content Distribution with Network Coding in Multihop Wireless Networks
    Halloush, Rami
    Liu, Hang
    Dong, Lijun
    Wu, Mingquan
    Radha, Hayder
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2017, 3 (01) : 47 - 54
  • [23] Hop-by-hop Content Distribution with Network Coding in Multihop Wireless Networks
    Rami Halloush
    Hang Liu
    Lijun Dong
    Mingquan Wu
    Hayder Radha
    [J]. Digital Communications and Networks, 2017, 3 (01) : 47 - 54
  • [24] Adaptive hop-by-hop cone vector-based forwarding protocol for underwater wireless sensor networks
    Khan, Imran Ullah
    Islam, Mazhar
    Ismail, Muhammad
    Qazi, Abdul Baseer
    Jan, Sadeeq
    Ullah, Ihsan
    Farid, Zahid
    Wadud, Zahid
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (09):
  • [25] Hop-by-Hop Transport for Satellite Networks
    Chen Jing
    Liu Lixiang
    Hu Xiaohui
    Xu Fanjiang
    [J]. 2009 IEEE AEROSPACE CONFERENCE, VOLS 1-7, 2009, : 955 - 961
  • [26] SDAP: A secure Hop-by-hop Data Aggregation Protocol for sensor networks
    Yang, Yi
    Wang, Xinran
    Zhu, Sencun
    Cao, Guohong
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (04)
  • [27] Data transmission reliability assurance scheme based on hop-by-hop adaptive FEC for wireless sensor networks
    Xia M.
    Dong Y.-B.
    Lu D.-M.
    [J]. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2011, 45 (02): : 273 - 279
  • [28] Cross-layered hop-by-hop congestion control for multihop wireless networks
    Lee, Kang Yong
    Cho, Kee-Seong
    Lee, Byung-Sun
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2006, : 435 - +
  • [29] A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks
    Nghiem, Thao P.
    Cho, Tae Ho
    [J]. COMPUTER COMMUNICATIONS, 2010, 33 (10) : 1202 - 1209
  • [30] A Lightweight Authentication and Hop-by-Hop Security Mechanism for SIP Network
    Choi, Jueduck
    Jung, Souhwan
    Bac, Kwangyong
    Moon, Hokun
    [J]. 2008 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS, PROCEEDINGS, 2008, : 239 - 242