Multi-sender Broadcast Authentication in Wireless Sensor Networks

Broadcast authentication, a fundamental feature in wireless sensor networks (WSNs), enables users to broadcast to multiple sensor nodes in an authenticated way. Symmetric-key-based μTESLA-like schemes are a popular solution due to their energy efficiency, but most schemes are not scalable (e.g. in t...

Full description

Saved in:
Bibliographic Details
Published in2014 Tenth International Conference on Computational Intelligence and Security pp. 633 - 637
Main Authors Ya Gao, Peng Zeng, Choo, Kim-Kwang Raymond
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.11.2014
Subjects
Online AccessGet full text
DOI10.1109/CIS.2014.147

Cover

Abstract Broadcast authentication, a fundamental feature in wireless sensor networks (WSNs), enables users to broadcast to multiple sensor nodes in an authenticated way. Symmetric-key-based μTESLA-like schemes are a popular solution due to their energy efficiency, but most schemes are not scalable (e.g. in terms of the number of senders). On the other hand, several schemes based on public key cryptography (PKC) are proposed to secure the multi-user broadcast in WSNs. However, the computation and communication overheads in the underlying PKC infrastructure restrict its implementation in resource-constrained WSNs. This paper presents an efficient scheme, which supports multi-sender broadcast authentication and allows dynamic addition of new senders. We delay disclosing the keys of the master key chain generated by the base station to authenticate the commitment of each sender's key chain. Considering that senders may be captured and compromised by adversaries in a hostile environment, our scheme also provides a mechanism to revoke the compromised senders' broadcast authentication capability.
AbstractList Broadcast authentication, a fundamental feature in wireless sensor networks (WSNs), enables users to broadcast to multiple sensor nodes in an authenticated way. Symmetric-key-based μTESLA-like schemes are a popular solution due to their energy efficiency, but most schemes are not scalable (e.g. in terms of the number of senders). On the other hand, several schemes based on public key cryptography (PKC) are proposed to secure the multi-user broadcast in WSNs. However, the computation and communication overheads in the underlying PKC infrastructure restrict its implementation in resource-constrained WSNs. This paper presents an efficient scheme, which supports multi-sender broadcast authentication and allows dynamic addition of new senders. We delay disclosing the keys of the master key chain generated by the base station to authenticate the commitment of each sender's key chain. Considering that senders may be captured and compromised by adversaries in a hostile environment, our scheme also provides a mechanism to revoke the compromised senders' broadcast authentication capability.
Author Ya Gao
Peng Zeng
Choo, Kim-Kwang Raymond
Author_xml – sequence: 1
  surname: Ya Gao
  fullname: Ya Gao
  email: gaoya_2009@hotmail.com
  organization: Shanghai Key Lab. of Trustworthy Comput., East China Normal Univ., Shanghai, China
– sequence: 2
  surname: Peng Zeng
  fullname: Peng Zeng
  email: pzeng@sei.ecnu.edu.cn
  organization: Shanghai Key Lab. of Trustworthy Comput., East China Normal Univ., Shanghai, China
– sequence: 3
  givenname: Kim-Kwang Raymond
  surname: Choo
  fullname: Choo, Kim-Kwang Raymond
  email: raymond.choo@fulbrightmail.org
  organization: Inf. Assurance Res. Lab., Univ. of South Australia, Adelaide, SA, Australia
BookMark eNotzL1OwzAUQGEjgQSUbGwsfoEE_9z42mOIoFQqMLQSY-U0t8IiOMh2hXh7kGA633Qu2WmcIzF2LUUjpXC3_WrTKCGhkYAnrHJof-EcgtZ4zqqcwyCUQQPGwgXrno5TCXWmOFLid2n2497nwrtjeaNYwt6XMEceIn8NiSbKmW8o5jnxZypfc3rPV-zs4KdM1X8XbPtwv-0f6_XLctV36zpIbEs9giZFiKrV1kuL4mBagMGCHwfr8KCN8rIVQihEQrJGGe0J2lEZGJTVC3bztw1EtPtM4cOn7x0KaRxq_QNlcEhw
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CIS.2014.147
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
Accès UT - IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore Digital Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781479974337
147997434X
1479974331
9781479974344
EndPage 637
ExternalDocumentID 7016973
Genre orig-research
GroupedDBID 6IE
6IL
ALMA_UNASSIGNED_HOLDINGS
CBEJK
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i175t-d43e2e772538a1870f6544b84adb897f362a15000277e7e86263ae45d264b283
IEDL.DBID RIE
IngestDate Wed Dec 20 05:18:54 EST 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-d43e2e772538a1870f6544b84adb897f362a15000277e7e86263ae45d264b283
PageCount 5
ParticipantIDs ieee_primary_7016973
PublicationCentury 2000
PublicationDate 2014-Nov.
PublicationDateYYYYMMDD 2014-11-01
PublicationDate_xml – month: 11
  year: 2014
  text: 2014-Nov.
PublicationDecade 2010
PublicationTitle 2014 Tenth International Conference on Computational Intelligence and Security
PublicationTitleAbbrev CIS
PublicationYear 2014
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib026764684
Score 1.6206286
Snippet Broadcast authentication, a fundamental feature in wireless sensor networks (WSNs), enables users to broadcast to multiple sensor nodes in an authenticated...
SourceID ieee
SourceType Publisher
StartPage 633
SubjectTerms Authentication
Base stations
broadcast authentication
Delays
multi-sender
Protocols
wireless
Wireless communication
Wireless sensor networks
Title Multi-sender Broadcast Authentication in Wireless Sensor Networks
URI https://ieeexplore.ieee.org/document/7016973
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NTwIxEJ0AJ09qwPidHjy6ILv9PBoiQROICZhwI-12NiGaxchy8dc77QJG48Fb08tuu915M9P3ZgBusjTnBBQmcYVQCZdII22L5C5zXuZonIhamPFEjl7401zMG3C718IgYiSfYTcM412-X-WbkCrrqVA6RGVNaCota63W7uykUkkuNd9z201v8DgN1C1OxuBn75QIHcNDGO8eWjNGXrubynXzz1_1GP_7VkfQ-Rbpsec9_BxDA8s23EdBbbKODeIYxdjW53ZdsZAJC7ygOkHHliULtNc3MnNsSoHs6oNNaj74ugOz4cNsMEq2XRKSJUF_lXieYYrkJJPpsn36_QopOHeaW--0UQUhlO2LeMWoUGGIYDKLXHhyhRw5FyfQKlclngIjrMJCaW8NYTamXJu-ES5PY0kX5OkZtMPqF-91HYzFduHnf09fwEHY_Vq3dwmt6mODVwTglbuOX-4Lej2aqQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NTwIxEJ0gHvSkBozf9uDRguy22-3REAkoEBMw4Uba3dmEaBYCy8Vf77QLGI0Hb00vu-12581M35sBuAuDRBBQaG4zqbiIkEaxyfhDaNMoQW2l18IMhlH3TTxP5KQC9zstDCJ68hk23NDf5afzZO1SZU3lSoeocA_2pRBClmqt7ekJIhWJKBY7drtutnsjR94SZA5-dk_x4NE5gsH2sSVn5L2xLmwj-fxVkfG_73UM9W-ZHnvdAdAJVDCvwaOX1PKVbxHHKMo2aWJWBXO5MMcMKlN0bJYzR3z9IEPHRhTKzpdsWDLCV3UYd57G7S7f9EngMwL_gqcixADJTSbjZVr0A2YR7Y-NhUltrFVGGGVa0l8yKlToYpjQoJApOUOW3ItTqObzHM-AEVphpuLUaEJtDESsW1raJPBFXVAE51Bzq58uykoY083CL_6evoWD7njQn_Z7w5dLOAyccMCr-K6gWizXeE1wXtgb_xW_AMdbnfU
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+Tenth+International+Conference+on+Computational+Intelligence+and+Security&rft.atitle=Multi-sender+Broadcast+Authentication+in+Wireless+Sensor+Networks&rft.au=Ya+Gao&rft.au=Peng+Zeng&rft.au=Choo%2C+Kim-Kwang+Raymond&rft.date=2014-11-01&rft.pub=IEEE&rft.spage=633&rft.epage=637&rft_id=info:doi/10.1109%2FCIS.2014.147&rft.externalDocID=7016973