On Broadcast Authentication in Wireless Sensor Networks

Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as muTESLA and multilevel muTESLA have been proposed to provide such services for WSNs; however, these sch...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on wireless communications 2007-11, Vol.6 (11), p.4136-4144
Hauptverfasser: Kui Ren, Wenjing Lou, Kai Zeng, Moran, P.J.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 4144
container_issue 11
container_start_page 4136
container_title IEEE transactions on wireless communications
container_volume 6
creator Kui Ren
Wenjing Lou
Kai Zeng
Moran, P.J.
description Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as muTESLA and multilevel muTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks due to the delay in message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes. Several cryptographic techniques, including Merkle hash tree and identity-based signature scheme, are adopted to minimize the scheme overhead regarding the costs on both computation and communication. A quantitative energy consumption analysis of the proposed schemes is given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs.
doi_str_mv 10.1109/TWC.2007.060255
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_4381422</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4381422</ieee_id><sourcerecordid>1671247899</sourcerecordid><originalsourceid>FETCH-LOGICAL-c526t-69647ebb4efc657bdad64714c6af24837f5f9f7f3bd3a86fd7a5183015c633003</originalsourceid><addsrcrecordid>eNp90ctLwzAcB_AiCs7p2YOXIvi4dMv7cZzDFwx3cLJjyNIEO7t2Ji3if29Kh4KHnRKSz-_HL_kmyTkEIwiBHC-W0xECgI8AA4jSg2QAKRUZQkQcdnvMMog4O05OQlgDADmjdJDweZXe-VrnRocmnbTNu62awuimqKu0qNJl4W1pQ0hfbRVqn77Y5qv2H-E0OXK6DPZstw6Tt4f7xfQpm80fn6eTWWYoYk3GJCPcrlbEOsMoX-U6jweQGKZdHAxzR5103OFVjrVgLueaQoEBpIZhDAAeJjd9362vP1sbGrUpgrFlqStbt0FJgBkGEpEor_dKTAhhgqMIb_dCyDhEhAspI738R9d166v4YCUYoSJ-YYfGPTK-DsFbp7a-2Gj_rSBQXTQqRqO6aFQfTay42rXVwejSeV2ZIvyVScypkJ276F1hrf29JlhAghD-AYSWlJg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>864586559</pqid></control><display><type>article</type><title>On Broadcast Authentication in Wireless Sensor Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Kui Ren ; Wenjing Lou ; Kai Zeng ; Moran, P.J.</creator><creatorcontrib>Kui Ren ; Wenjing Lou ; Kai Zeng ; Moran, P.J.</creatorcontrib><description>Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as muTESLA and multilevel muTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks due to the delay in message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes. Several cryptographic techniques, including Merkle hash tree and identity-based signature scheme, are adopted to minimize the scheme overhead regarding the costs on both computation and communication. A quantitative energy consumption analysis of the proposed schemes is given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs.</description><identifier>ISSN: 1536-1276</identifier><identifier>EISSN: 1558-2248</identifier><identifier>DOI: 10.1109/TWC.2007.060255</identifier><identifier>CODEN: ITWCAX</identifier><language>eng</language><publisher>Piscataway, NJ: IEEE</publisher><subject>Applied sciences ; Authentication ; Broadcasting ; Computational efficiency ; Computer crime ; Cryptography ; Delay ; Energy consumption ; Exact sciences and technology ; Identity-based encryption ; Message authentication ; Messages ; Multilevel ; Networks ; Public key ; Public key cryptography ; Sensors ; Services and terminals of telecommunications ; Systems, networks and services of telecommunications ; Telecommunications ; Telecommunications and information theory ; Telemetry. Remote supervision. Telewarning. Remote control ; Wireless sensor networks</subject><ispartof>IEEE transactions on wireless communications, 2007-11, Vol.6 (11), p.4136-4144</ispartof><rights>2007 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2007</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c526t-69647ebb4efc657bdad64714c6af24837f5f9f7f3bd3a86fd7a5183015c633003</citedby><cites>FETCH-LOGICAL-c526t-69647ebb4efc657bdad64714c6af24837f5f9f7f3bd3a86fd7a5183015c633003</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4381422$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4381422$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=19375895$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Kui Ren</creatorcontrib><creatorcontrib>Wenjing Lou</creatorcontrib><creatorcontrib>Kai Zeng</creatorcontrib><creatorcontrib>Moran, P.J.</creatorcontrib><title>On Broadcast Authentication in Wireless Sensor Networks</title><title>IEEE transactions on wireless communications</title><addtitle>TWC</addtitle><description>Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as muTESLA and multilevel muTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks due to the delay in message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes. Several cryptographic techniques, including Merkle hash tree and identity-based signature scheme, are adopted to minimize the scheme overhead regarding the costs on both computation and communication. A quantitative energy consumption analysis of the proposed schemes is given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs.</description><subject>Applied sciences</subject><subject>Authentication</subject><subject>Broadcasting</subject><subject>Computational efficiency</subject><subject>Computer crime</subject><subject>Cryptography</subject><subject>Delay</subject><subject>Energy consumption</subject><subject>Exact sciences and technology</subject><subject>Identity-based encryption</subject><subject>Message authentication</subject><subject>Messages</subject><subject>Multilevel</subject><subject>Networks</subject><subject>Public key</subject><subject>Public key cryptography</subject><subject>Sensors</subject><subject>Services and terminals of telecommunications</subject><subject>Systems, networks and services of telecommunications</subject><subject>Telecommunications</subject><subject>Telecommunications and information theory</subject><subject>Telemetry. Remote supervision. Telewarning. Remote control</subject><subject>Wireless sensor networks</subject><issn>1536-1276</issn><issn>1558-2248</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2007</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNp90ctLwzAcB_AiCs7p2YOXIvi4dMv7cZzDFwx3cLJjyNIEO7t2Ji3if29Kh4KHnRKSz-_HL_kmyTkEIwiBHC-W0xECgI8AA4jSg2QAKRUZQkQcdnvMMog4O05OQlgDADmjdJDweZXe-VrnRocmnbTNu62awuimqKu0qNJl4W1pQ0hfbRVqn77Y5qv2H-E0OXK6DPZstw6Tt4f7xfQpm80fn6eTWWYoYk3GJCPcrlbEOsMoX-U6jweQGKZdHAxzR5103OFVjrVgLueaQoEBpIZhDAAeJjd9362vP1sbGrUpgrFlqStbt0FJgBkGEpEor_dKTAhhgqMIb_dCyDhEhAspI738R9d166v4YCUYoSJ-YYfGPTK-DsFbp7a-2Gj_rSBQXTQqRqO6aFQfTay42rXVwejSeV2ZIvyVScypkJ276F1hrf29JlhAghD-AYSWlJg</recordid><startdate>20071101</startdate><enddate>20071101</enddate><creator>Kui Ren</creator><creator>Wenjing Lou</creator><creator>Kai Zeng</creator><creator>Moran, P.J.</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20071101</creationdate><title>On Broadcast Authentication in Wireless Sensor Networks</title><author>Kui Ren ; Wenjing Lou ; Kai Zeng ; Moran, P.J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c526t-69647ebb4efc657bdad64714c6af24837f5f9f7f3bd3a86fd7a5183015c633003</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Applied sciences</topic><topic>Authentication</topic><topic>Broadcasting</topic><topic>Computational efficiency</topic><topic>Computer crime</topic><topic>Cryptography</topic><topic>Delay</topic><topic>Energy consumption</topic><topic>Exact sciences and technology</topic><topic>Identity-based encryption</topic><topic>Message authentication</topic><topic>Messages</topic><topic>Multilevel</topic><topic>Networks</topic><topic>Public key</topic><topic>Public key cryptography</topic><topic>Sensors</topic><topic>Services and terminals of telecommunications</topic><topic>Systems, networks and services of telecommunications</topic><topic>Telecommunications</topic><topic>Telecommunications and information theory</topic><topic>Telemetry. Remote supervision. Telewarning. Remote control</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kui Ren</creatorcontrib><creatorcontrib>Wenjing Lou</creatorcontrib><creatorcontrib>Kai Zeng</creatorcontrib><creatorcontrib>Moran, P.J.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on wireless communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kui Ren</au><au>Wenjing Lou</au><au>Kai Zeng</au><au>Moran, P.J.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On Broadcast Authentication in Wireless Sensor Networks</atitle><jtitle>IEEE transactions on wireless communications</jtitle><stitle>TWC</stitle><date>2007-11-01</date><risdate>2007</risdate><volume>6</volume><issue>11</issue><spage>4136</spage><epage>4144</epage><pages>4136-4144</pages><issn>1536-1276</issn><eissn>1558-2248</eissn><coden>ITWCAX</coden><abstract>Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as muTESLA and multilevel muTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks due to the delay in message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes. Several cryptographic techniques, including Merkle hash tree and identity-based signature scheme, are adopted to minimize the scheme overhead regarding the costs on both computation and communication. A quantitative energy consumption analysis of the proposed schemes is given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs.</abstract><cop>Piscataway, NJ</cop><pub>IEEE</pub><doi>10.1109/TWC.2007.060255</doi><tpages>9</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1536-1276
ispartof IEEE transactions on wireless communications, 2007-11, Vol.6 (11), p.4136-4144
issn 1536-1276
1558-2248
language eng
recordid cdi_ieee_primary_4381422
source IEEE Electronic Library (IEL)
subjects Applied sciences
Authentication
Broadcasting
Computational efficiency
Computer crime
Cryptography
Delay
Energy consumption
Exact sciences and technology
Identity-based encryption
Message authentication
Messages
Multilevel
Networks
Public key
Public key cryptography
Sensors
Services and terminals of telecommunications
Systems, networks and services of telecommunications
Telecommunications
Telecommunications and information theory
Telemetry. Remote supervision. Telewarning. Remote control
Wireless sensor networks
title On Broadcast Authentication in Wireless Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T22%3A54%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20Broadcast%20Authentication%20in%20Wireless%20Sensor%20Networks&rft.jtitle=IEEE%20transactions%20on%20wireless%20communications&rft.au=Kui%20Ren&rft.date=2007-11-01&rft.volume=6&rft.issue=11&rft.spage=4136&rft.epage=4144&rft.pages=4136-4144&rft.issn=1536-1276&rft.eissn=1558-2248&rft.coden=ITWCAX&rft_id=info:doi/10.1109/TWC.2007.060255&rft_dat=%3Cproquest_RIE%3E1671247899%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=864586559&rft_id=info:pmid/&rft_ieee_id=4381422&rfr_iscdi=true