Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem

被引:13
作者
Eldefrawy, Mohamed Hamdy [1 ]
Khan, Muhammad Khurram [1 ]
Alghathbar, Khaled [1 ,2 ]
Cho, Eun-Suk [3 ]
机构
[1] King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh 11653, Saudi Arabia
[2] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11653, Saudi Arabia
[3] Hannam Univ, Dept Multimedia, Taejon 306791, South Korea
关键词
wireless sensor network; authenticated broadcast; nested hashing chains; Chinese Remainder Theorem;
D O I
10.3390/s100908683
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. mu TESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verification. However, it suffers from several flaws considering the delay tolerance, and the chain length restriction. In this paper, we propose a protocol which provides broadcast authentication for wireless sensor networks. This protocol uses a nested hash chain of two different hash functions and the Chinese Remainder Theorem (CRT). The two different nested hash functions are employed for the seed updating and the key generation. Each sensor node is challenged independently with a common broadcasting message using the CRT. Our algorithm provides forward and non-restricted key generation, and in addition, no time synchronization is required. Furthermore, receivers can instantly authenticate packets in real time. Moreover, the comprehensive analysis shows that this scheme is efficient and practical, and can achieve better performance than the mu TESLA system.
引用
收藏
页码:8683 / 8695
页数:13
相关论文
共 16 条
[1]  
[Anonymous], 2002, RSA CryptoBytes
[2]   Infinite length hash chains and their applications [J].
Bicakci, K ;
Baykal, N .
WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, :57-61
[3]   One-Time Password Authentication with Infinite Hash Chains [J].
Chefranov, Alexander G. .
NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, :283-286
[4]  
ELDEFRAWY M, 2010, P INT C ANT SEC ID A
[5]  
FAN Y, 2005, P INT C WIR NETW COM, V13, P304
[6]  
HU Y, 2003, P INFOCOM SAN FRANC
[7]   Improving the security of 'a flexible biometrics remote user authentication scheme' [J].
Khan, Muhammad Khurram ;
Zhang, Jiashu .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) :82-85
[8]   Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks' [J].
Khan, Muhammad Khurram ;
Alghathbar, Khaled .
SENSORS, 2010, 10 (03) :2450-2459
[9]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[10]  
LIU D, 2003, P 10 ANN NETW DISTR, V2, P263