An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks

被引:4
作者
Mbarek, Bacem [1 ]
Meddeb, Aref [2 ]
Ben Jaballah, Wafa [3 ]
Mosbah, Mohamed [4 ]
机构
[1] Univ Tunis El Manar, Natl Engn Sch Tunis, Tunis, Tunisia
[2] Univ Sousse, NOCCS Lab, Natl Engn Sch Sousse, Tunis, Tunisia
[3] Orange, Paris, France
[4] Univ Bordeaux, CNRS, Bordeaux INP, LaBRI, Bordeaux, France
来源
8TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2017) AND THE 7TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT 2017) | 2017年 / 109卷
关键词
Source Authentication; Broadcast authentication; Wireless Sensor Networks; Bloom filter;
D O I
10.1016/j.procs.2017.05.340
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Broadcast source authentication is a challenging topic in wireless sensor networks. This security service allows senders to broadcast messages to multiple receivers in a secure way. Although several authentication mechanisms have been proposed to address the need for security in WSNs, most of them are resource consuming and are inadequate for constrained environments. In this paper, we shed the light to the security vulnerabilities of symmetric key based authentication mechanisms, and their inability to tackle memory DoS attacks. Moreover, we provide a new efficient broadcast authentication scheme based on a Bloom filter data structure in order to reduce the communication overhead. Finally, we run a thorough set of simulations to assess the efficiency of our approach compared to some state of the art solutions in terms of energy consumption, communication and computation overhead. Our results provide insight into the suitability of our approach for use in WSNs. (C) 2017 The Authors. Published by Elsevier B.V.
引用
收藏
页码:553 / 559
页数:7
相关论文
共 19 条
  • [1] [Anonymous], AICCSA
  • [2] [Anonymous], TECH REP
  • [3] [Anonymous], 2015, 2015 IEEE ACS 12 INT
  • [4] [Anonymous], GLOB TEL C 2005 GLOB
  • [5] Lightweight secure group communications for resource constrained devices
    Ben Jaballah, Wafa
    Mosbah, Mohamed
    Youssef, Habib
    Zemmari, Akka
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2015, 5 (04) : 187 - 200
  • [6] Lightweight Source Authentication Mechanisms for Group Communications in Wireless Sensor Networks
    Ben Jaballah, Wafa
    Mosbah, Mohamed
    Youssef, Habib
    Zemmari, Akka
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2013, : 598 - 605
  • [7] Ben Jaballah W, 2013, INT CONF PERVAS COMP, P566
  • [8] SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS
    BLOOM, BH
    [J]. COMMUNICATIONS OF THE ACM, 1970, 13 (07) : 422 - &
  • [9] Prerforrnance comparison of detection schemes for MAC layer misbehaviorl
    Cardenas, Alvaro A.
    Radosavac, Svetlana
    Baras, John S.
    [J]. INFOCOM 2007, VOLS 1-5, 2007, : 1496 - +
  • [10] PAWN: a payload-based mutual authentication scheme for wireless sensor networks
    Jan, Mian
    Nanda, Priyadarsi
    Usman, Muhammad
    He, Xiangjian
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (17)