A practical inter-sensor broadcast authentication scheme

被引:0
作者
Kim, Joon Wan [1 ]
Kim, Yong Ho [1 ]
Lee, Hwaseong [1 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, CIST, Seoul, South Korea
来源
UNIVERSAL ACCESS IN HUMAN COMPUTER INTERACTION: COPING WITH DIVERSITY, PT 1 | 2007年 / 4554卷
关键词
security; authentication; wireless sensor network;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For inter-sensor broadcast authentication in wireless sensor networks, Chen et al. proposed a bootstrapping scheme which enables to save only neighboring nodes' hash-chain commitments, much fewer than whole network size, before deployment [2]. However, the scheme lacks scalability and is not tolerant for node isolation. Therefore, we suggest new mechanism providing scalability and present its modified version with node-redemption which makes most of nodes participate in broadcast authentication with a little additional memory.
引用
收藏
页码:399 / +
页数:2
相关论文
共 13 条
  • [1] Random key predistribution schemes for sensor networks
    Chan, HW
    Perrig, A
    Song, D
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213
  • [2] Chang S.-M., 2006, P 2006 ACM S INFORM, P311, DOI [10.1145/1128817.1128864, DOI 10.1145/1128817.1128864]
  • [3] Chen Wen-Huei, 2005, IEEE COMMUNICATION L, V9
  • [4] Deng J, 2003, LECT NOTES COMPUT SC, V2634, P349
  • [5] Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
  • [6] HWANG J, 2004, ACM WORKSH SEC ADHOC
  • [7] LIU D, 2006, P ANN NETWORK DISTR, P263
  • [8] Menezes A. J, 1997, HDB APPL CRYPTOGRAPH
  • [9] MOON H, 2006, P IEEK, V43, P683
  • [10] Security in wireless sensor networks
    Perrig, A
    Stankovic, J
    Wagner, D
    [J]. COMMUNICATIONS OF THE ACM, 2004, 47 (06) : 53 - 57