Multi-sender Broadcast Authentication in Wireless Sensor Networks
Broadcast authentication, a fundamental feature in wireless sensor networks (WSNs), enables users to broadcast to multiple sensor nodes in an authenticated way. Symmetric-key-based μTESLA-like schemes are a popular solution due to their energy efficiency, but most schemes are not scalable (e.g. in t...
        Saved in:
      
    
          | Published in | 2014 Tenth International Conference on Computational Intelligence and Security pp. 633 - 637 | 
|---|---|
| Main Authors | , , | 
| Format | Conference Proceeding | 
| Language | English | 
| Published | 
            IEEE
    
        01.11.2014
     | 
| Subjects | |
| Online Access | Get full text | 
| DOI | 10.1109/CIS.2014.147 | 
Cover
| Abstract | Broadcast authentication, a fundamental feature in wireless sensor networks (WSNs), enables users to broadcast to multiple sensor nodes in an authenticated way. Symmetric-key-based μTESLA-like schemes are a popular solution due to their energy efficiency, but most schemes are not scalable (e.g. in terms of the number of senders). On the other hand, several schemes based on public key cryptography (PKC) are proposed to secure the multi-user broadcast in WSNs. However, the computation and communication overheads in the underlying PKC infrastructure restrict its implementation in resource-constrained WSNs. This paper presents an efficient scheme, which supports multi-sender broadcast authentication and allows dynamic addition of new senders. We delay disclosing the keys of the master key chain generated by the base station to authenticate the commitment of each sender's key chain. Considering that senders may be captured and compromised by adversaries in a hostile environment, our scheme also provides a mechanism to revoke the compromised senders' broadcast authentication capability. | 
    
|---|---|
| AbstractList | Broadcast authentication, a fundamental feature in wireless sensor networks (WSNs), enables users to broadcast to multiple sensor nodes in an authenticated way. Symmetric-key-based μTESLA-like schemes are a popular solution due to their energy efficiency, but most schemes are not scalable (e.g. in terms of the number of senders). On the other hand, several schemes based on public key cryptography (PKC) are proposed to secure the multi-user broadcast in WSNs. However, the computation and communication overheads in the underlying PKC infrastructure restrict its implementation in resource-constrained WSNs. This paper presents an efficient scheme, which supports multi-sender broadcast authentication and allows dynamic addition of new senders. We delay disclosing the keys of the master key chain generated by the base station to authenticate the commitment of each sender's key chain. Considering that senders may be captured and compromised by adversaries in a hostile environment, our scheme also provides a mechanism to revoke the compromised senders' broadcast authentication capability. | 
    
| Author | Ya Gao Peng Zeng Choo, Kim-Kwang Raymond  | 
    
| Author_xml | – sequence: 1 surname: Ya Gao fullname: Ya Gao email: gaoya_2009@hotmail.com organization: Shanghai Key Lab. of Trustworthy Comput., East China Normal Univ., Shanghai, China – sequence: 2 surname: Peng Zeng fullname: Peng Zeng email: pzeng@sei.ecnu.edu.cn organization: Shanghai Key Lab. of Trustworthy Comput., East China Normal Univ., Shanghai, China – sequence: 3 givenname: Kim-Kwang Raymond surname: Choo fullname: Choo, Kim-Kwang Raymond email: raymond.choo@fulbrightmail.org organization: Inf. Assurance Res. Lab., Univ. of South Australia, Adelaide, SA, Australia  | 
    
| BookMark | eNotzL1OwzAUQGEjgQSUbGwsfoEE_9z42mOIoFQqMLQSY-U0t8IiOMh2hXh7kGA633Qu2WmcIzF2LUUjpXC3_WrTKCGhkYAnrHJof-EcgtZ4zqqcwyCUQQPGwgXrno5TCXWmOFLid2n2497nwrtjeaNYwt6XMEceIn8NiSbKmW8o5jnxZypfc3rPV-zs4KdM1X8XbPtwv-0f6_XLctV36zpIbEs9giZFiKrV1kuL4mBagMGCHwfr8KCN8rIVQihEQrJGGe0J2lEZGJTVC3bztw1EtPtM4cOn7x0KaRxq_QNlcEhw | 
    
| CODEN | IEEPAD | 
    
| ContentType | Conference Proceeding | 
    
| DBID | 6IE 6IL CBEJK RIE RIL  | 
    
| DOI | 10.1109/CIS.2014.147 | 
    
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings Accès UT - IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore Digital Library IEEE Proceedings Order Plans (POP All) 1998-Present  | 
    
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| EISBN | 9781479974337 147997434X 1479974331 9781479974344  | 
    
| EndPage | 637 | 
    
| ExternalDocumentID | 7016973 | 
    
| Genre | orig-research | 
    
| GroupedDBID | 6IE 6IL ALMA_UNASSIGNED_HOLDINGS CBEJK RIB RIC RIE RIL  | 
    
| ID | FETCH-LOGICAL-i175t-d43e2e772538a1870f6544b84adb897f362a15000277e7e86263ae45d264b283 | 
    
| IEDL.DBID | RIE | 
    
| IngestDate | Wed Dec 20 05:18:54 EST 2023 | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | false | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-i175t-d43e2e772538a1870f6544b84adb897f362a15000277e7e86263ae45d264b283 | 
    
| PageCount | 5 | 
    
| ParticipantIDs | ieee_primary_7016973 | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2014-Nov. | 
    
| PublicationDateYYYYMMDD | 2014-11-01 | 
    
| PublicationDate_xml | – month: 11 year: 2014 text: 2014-Nov.  | 
    
| PublicationDecade | 2010 | 
    
| PublicationTitle | 2014 Tenth International Conference on Computational Intelligence and Security | 
    
| PublicationTitleAbbrev | CIS | 
    
| PublicationYear | 2014 | 
    
| Publisher | IEEE | 
    
| Publisher_xml | – name: IEEE | 
    
| SSID | ssib026764684 | 
    
| Score | 1.6206286 | 
    
| Snippet | Broadcast authentication, a fundamental feature in wireless sensor networks (WSNs), enables users to broadcast to multiple sensor nodes in an authenticated... | 
    
| SourceID | ieee | 
    
| SourceType | Publisher | 
    
| StartPage | 633 | 
    
| SubjectTerms | Authentication Base stations broadcast authentication Delays multi-sender Protocols wireless Wireless communication Wireless sensor networks  | 
    
| Title | Multi-sender Broadcast Authentication in Wireless Sensor Networks | 
    
| URI | https://ieeexplore.ieee.org/document/7016973 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NTwIxEJ0AJ09qwPidHjy6ILv9PBoiQROICZhwI-12NiGaxchy8dc77QJG48Fb08tuu915M9P3ZgBusjTnBBQmcYVQCZdII22L5C5zXuZonIhamPFEjl7401zMG3C718IgYiSfYTcM412-X-WbkCrrqVA6RGVNaCota63W7uykUkkuNd9z201v8DgN1C1OxuBn75QIHcNDGO8eWjNGXrubynXzz1_1GP_7VkfQ-Rbpsec9_BxDA8s23EdBbbKODeIYxdjW53ZdsZAJC7ygOkHHliULtNc3MnNsSoHs6oNNaj74ugOz4cNsMEq2XRKSJUF_lXieYYrkJJPpsn36_QopOHeaW--0UQUhlO2LeMWoUGGIYDKLXHhyhRw5FyfQKlclngIjrMJCaW8NYTamXJu-ES5PY0kX5OkZtMPqF-91HYzFduHnf09fwEHY_Vq3dwmt6mODVwTglbuOX-4Lej2aqQ | 
    
| linkProvider | IEEE | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NTwIxEJ0gHvSkBozf9uDRguy22-3REAkoEBMw4Uba3dmEaBYCy8Vf77QLGI0Hb00vu-12581M35sBuAuDRBBQaG4zqbiIkEaxyfhDaNMoQW2l18IMhlH3TTxP5KQC9zstDCJ68hk23NDf5afzZO1SZU3lSoeocA_2pRBClmqt7ekJIhWJKBY7drtutnsjR94SZA5-dk_x4NE5gsH2sSVn5L2xLmwj-fxVkfG_73UM9W-ZHnvdAdAJVDCvwaOX1PKVbxHHKMo2aWJWBXO5MMcMKlN0bJYzR3z9IEPHRhTKzpdsWDLCV3UYd57G7S7f9EngMwL_gqcixADJTSbjZVr0A2YR7Y-NhUltrFVGGGVa0l8yKlToYpjQoJApOUOW3ItTqObzHM-AEVphpuLUaEJtDESsW1raJPBFXVAE51Bzq58uykoY083CL_6evoWD7njQn_Z7w5dLOAyccMCr-K6gWizXeE1wXtgb_xW_AMdbnfU | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+Tenth+International+Conference+on+Computational+Intelligence+and+Security&rft.atitle=Multi-sender+Broadcast+Authentication+in+Wireless+Sensor+Networks&rft.au=Ya+Gao&rft.au=Peng+Zeng&rft.au=Choo%2C+Kim-Kwang+Raymond&rft.date=2014-11-01&rft.pub=IEEE&rft.spage=633&rft.epage=637&rft_id=info:doi/10.1109%2FCIS.2014.147&rft.externalDocID=7016973 |