Fast Response PKC-Based Broadcast Authentication in Wireless Sensor Networks

被引:0
作者
Panoat Chuchaisri
Richard Newman
机构
[1] University of Florida,
来源
Mobile Networks and Applications | 2012年 / 17卷
关键词
wireless sensor network; broadcast authentication; bloom filter; public key cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Public Key-based (PKC) approaches have gained popularity in Wireless Sensor Network (WSN) broadcast authentication due to their simpler protocol operations, e.g., no synchronization and higher tolerance to node capture attack compared to symmetric key-based approaches. With PKC’s security strength, a sensor node that authenticates messages before forwarding them can detect a bogus message within the first hop. While this prevents forged traffic from wasting the sensor nodes’ energy, performing PKC operations in the limited computing-power sensor nodes can result in undesirably long message propagation time. At the other extreme, the sensor node can forward messages to other nodes prior to authenticating them. This approach diminishes propagation time with the trade-off of allowing forged messages to propagate through the network. To achieve swift and energy efficient broadcast operation, sensor nodes need to decide wisely when to forward first and when to authenticate first.
引用
收藏
页码:508 / 525
页数:17
相关论文
共 22 条
  • [1] Bloom B(1970)Space/time trade-offs in hash coding with allowable errors Commun ACM 13 422-426
  • [2] Jüttner A(2005)Magi Á Tree based broadcast in ad hoc networks MONET 10 753-762
  • [3] Kang I(2005)Maximizing network lifetime of broadcasting over wireless stationary ad hoc networks MONET 10 879-896
  • [4] Poovendran R(2006)Reducing delay and enhancing dos resistance in multicast authentication through multigrade security IEEE J Intell Fuzzy Syst 1 190-204
  • [5] Li Q(2008)Mitigating DoS attacks against broadcast authentication in wireless sensor networks ACM Trans Sensor Netw 58 217-224
  • [6] Trappe W(2009)Secure collection tree protocol for tamper-resistant wireless sensors Communications in Computer and Information Science 47 53-57
  • [7] Ning P(2004)Security in wireless sensor networks Commun ACM 6 29-48
  • [8] Liu A(2009)ShortPK: a short-term public key scheme for broadcast authentication in sensor networks ACM Trans Sensor Netw 6 35-62
  • [9] Pecho P(2006)Efficient broadcasting protocols for regular wireless sensor networks Wirel Commun Mob Comput 35 54-undefined
  • [10] Nagy J(2002)Denial of service in sensor networks Comput undefined undefined-undefined