On Broadcast Authentication in Wireless Sensor Networks
Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as muTESLA and multilevel muTESLA have been proposed to provide such services for WSNs; however, these sch...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on wireless communications 2007-11, Vol.6 (11), p.4136-4144 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 4144 |
---|---|
container_issue | 11 |
container_start_page | 4136 |
container_title | IEEE transactions on wireless communications |
container_volume | 6 |
creator | Kui Ren Wenjing Lou Kai Zeng Moran, P.J. |
description | Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as muTESLA and multilevel muTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks due to the delay in message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes. Several cryptographic techniques, including Merkle hash tree and identity-based signature scheme, are adopted to minimize the scheme overhead regarding the costs on both computation and communication. A quantitative energy consumption analysis of the proposed schemes is given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs. |
doi_str_mv | 10.1109/TWC.2007.060255 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_4381422</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4381422</ieee_id><sourcerecordid>1671247899</sourcerecordid><originalsourceid>FETCH-LOGICAL-c526t-69647ebb4efc657bdad64714c6af24837f5f9f7f3bd3a86fd7a5183015c633003</originalsourceid><addsrcrecordid>eNp90ctLwzAcB_AiCs7p2YOXIvi4dMv7cZzDFwx3cLJjyNIEO7t2Ji3if29Kh4KHnRKSz-_HL_kmyTkEIwiBHC-W0xECgI8AA4jSg2QAKRUZQkQcdnvMMog4O05OQlgDADmjdJDweZXe-VrnRocmnbTNu62awuimqKu0qNJl4W1pQ0hfbRVqn77Y5qv2H-E0OXK6DPZstw6Tt4f7xfQpm80fn6eTWWYoYk3GJCPcrlbEOsMoX-U6jweQGKZdHAxzR5103OFVjrVgLueaQoEBpIZhDAAeJjd9362vP1sbGrUpgrFlqStbt0FJgBkGEpEor_dKTAhhgqMIb_dCyDhEhAspI738R9d166v4YCUYoSJ-YYfGPTK-DsFbp7a-2Gj_rSBQXTQqRqO6aFQfTay42rXVwejSeV2ZIvyVScypkJ276F1hrf29JlhAghD-AYSWlJg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>864586559</pqid></control><display><type>article</type><title>On Broadcast Authentication in Wireless Sensor Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Kui Ren ; Wenjing Lou ; Kai Zeng ; Moran, P.J.</creator><creatorcontrib>Kui Ren ; Wenjing Lou ; Kai Zeng ; Moran, P.J.</creatorcontrib><description>Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as muTESLA and multilevel muTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks due to the delay in message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes. Several cryptographic techniques, including Merkle hash tree and identity-based signature scheme, are adopted to minimize the scheme overhead regarding the costs on both computation and communication. A quantitative energy consumption analysis of the proposed schemes is given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs.</description><identifier>ISSN: 1536-1276</identifier><identifier>EISSN: 1558-2248</identifier><identifier>DOI: 10.1109/TWC.2007.060255</identifier><identifier>CODEN: ITWCAX</identifier><language>eng</language><publisher>Piscataway, NJ: IEEE</publisher><subject>Applied sciences ; Authentication ; Broadcasting ; Computational efficiency ; Computer crime ; Cryptography ; Delay ; Energy consumption ; Exact sciences and technology ; Identity-based encryption ; Message authentication ; Messages ; Multilevel ; Networks ; Public key ; Public key cryptography ; Sensors ; Services and terminals of telecommunications ; Systems, networks and services of telecommunications ; Telecommunications ; Telecommunications and information theory ; Telemetry. Remote supervision. Telewarning. Remote control ; Wireless sensor networks</subject><ispartof>IEEE transactions on wireless communications, 2007-11, Vol.6 (11), p.4136-4144</ispartof><rights>2007 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2007</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c526t-69647ebb4efc657bdad64714c6af24837f5f9f7f3bd3a86fd7a5183015c633003</citedby><cites>FETCH-LOGICAL-c526t-69647ebb4efc657bdad64714c6af24837f5f9f7f3bd3a86fd7a5183015c633003</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4381422$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4381422$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=19375895$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Kui Ren</creatorcontrib><creatorcontrib>Wenjing Lou</creatorcontrib><creatorcontrib>Kai Zeng</creatorcontrib><creatorcontrib>Moran, P.J.</creatorcontrib><title>On Broadcast Authentication in Wireless Sensor Networks</title><title>IEEE transactions on wireless communications</title><addtitle>TWC</addtitle><description>Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as muTESLA and multilevel muTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks due to the delay in message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes. Several cryptographic techniques, including Merkle hash tree and identity-based signature scheme, are adopted to minimize the scheme overhead regarding the costs on both computation and communication. A quantitative energy consumption analysis of the proposed schemes is given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs.</description><subject>Applied sciences</subject><subject>Authentication</subject><subject>Broadcasting</subject><subject>Computational efficiency</subject><subject>Computer crime</subject><subject>Cryptography</subject><subject>Delay</subject><subject>Energy consumption</subject><subject>Exact sciences and technology</subject><subject>Identity-based encryption</subject><subject>Message authentication</subject><subject>Messages</subject><subject>Multilevel</subject><subject>Networks</subject><subject>Public key</subject><subject>Public key cryptography</subject><subject>Sensors</subject><subject>Services and terminals of telecommunications</subject><subject>Systems, networks and services of telecommunications</subject><subject>Telecommunications</subject><subject>Telecommunications and information theory</subject><subject>Telemetry. Remote supervision. Telewarning. Remote control</subject><subject>Wireless sensor networks</subject><issn>1536-1276</issn><issn>1558-2248</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2007</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNp90ctLwzAcB_AiCs7p2YOXIvi4dMv7cZzDFwx3cLJjyNIEO7t2Ji3if29Kh4KHnRKSz-_HL_kmyTkEIwiBHC-W0xECgI8AA4jSg2QAKRUZQkQcdnvMMog4O05OQlgDADmjdJDweZXe-VrnRocmnbTNu62awuimqKu0qNJl4W1pQ0hfbRVqn77Y5qv2H-E0OXK6DPZstw6Tt4f7xfQpm80fn6eTWWYoYk3GJCPcrlbEOsMoX-U6jweQGKZdHAxzR5103OFVjrVgLueaQoEBpIZhDAAeJjd9362vP1sbGrUpgrFlqStbt0FJgBkGEpEor_dKTAhhgqMIb_dCyDhEhAspI738R9d166v4YCUYoSJ-YYfGPTK-DsFbp7a-2Gj_rSBQXTQqRqO6aFQfTay42rXVwejSeV2ZIvyVScypkJ276F1hrf29JlhAghD-AYSWlJg</recordid><startdate>20071101</startdate><enddate>20071101</enddate><creator>Kui Ren</creator><creator>Wenjing Lou</creator><creator>Kai Zeng</creator><creator>Moran, P.J.</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20071101</creationdate><title>On Broadcast Authentication in Wireless Sensor Networks</title><author>Kui Ren ; Wenjing Lou ; Kai Zeng ; Moran, P.J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c526t-69647ebb4efc657bdad64714c6af24837f5f9f7f3bd3a86fd7a5183015c633003</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Applied sciences</topic><topic>Authentication</topic><topic>Broadcasting</topic><topic>Computational efficiency</topic><topic>Computer crime</topic><topic>Cryptography</topic><topic>Delay</topic><topic>Energy consumption</topic><topic>Exact sciences and technology</topic><topic>Identity-based encryption</topic><topic>Message authentication</topic><topic>Messages</topic><topic>Multilevel</topic><topic>Networks</topic><topic>Public key</topic><topic>Public key cryptography</topic><topic>Sensors</topic><topic>Services and terminals of telecommunications</topic><topic>Systems, networks and services of telecommunications</topic><topic>Telecommunications</topic><topic>Telecommunications and information theory</topic><topic>Telemetry. Remote supervision. Telewarning. Remote control</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kui Ren</creatorcontrib><creatorcontrib>Wenjing Lou</creatorcontrib><creatorcontrib>Kai Zeng</creatorcontrib><creatorcontrib>Moran, P.J.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on wireless communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kui Ren</au><au>Wenjing Lou</au><au>Kai Zeng</au><au>Moran, P.J.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On Broadcast Authentication in Wireless Sensor Networks</atitle><jtitle>IEEE transactions on wireless communications</jtitle><stitle>TWC</stitle><date>2007-11-01</date><risdate>2007</risdate><volume>6</volume><issue>11</issue><spage>4136</spage><epage>4144</epage><pages>4136-4144</pages><issn>1536-1276</issn><eissn>1558-2248</eissn><coden>ITWCAX</coden><abstract>Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as muTESLA and multilevel muTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks due to the delay in message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes. Several cryptographic techniques, including Merkle hash tree and identity-based signature scheme, are adopted to minimize the scheme overhead regarding the costs on both computation and communication. A quantitative energy consumption analysis of the proposed schemes is given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs.</abstract><cop>Piscataway, NJ</cop><pub>IEEE</pub><doi>10.1109/TWC.2007.060255</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1536-1276 |
ispartof | IEEE transactions on wireless communications, 2007-11, Vol.6 (11), p.4136-4144 |
issn | 1536-1276 1558-2248 |
language | eng |
recordid | cdi_ieee_primary_4381422 |
source | IEEE Electronic Library (IEL) |
subjects | Applied sciences Authentication Broadcasting Computational efficiency Computer crime Cryptography Delay Energy consumption Exact sciences and technology Identity-based encryption Message authentication Messages Multilevel Networks Public key Public key cryptography Sensors Services and terminals of telecommunications Systems, networks and services of telecommunications Telecommunications Telecommunications and information theory Telemetry. Remote supervision. Telewarning. Remote control Wireless sensor networks |
title | On Broadcast Authentication in Wireless Sensor Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T22%3A54%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20Broadcast%20Authentication%20in%20Wireless%20Sensor%20Networks&rft.jtitle=IEEE%20transactions%20on%20wireless%20communications&rft.au=Kui%20Ren&rft.date=2007-11-01&rft.volume=6&rft.issue=11&rft.spage=4136&rft.epage=4144&rft.pages=4136-4144&rft.issn=1536-1276&rft.eissn=1558-2248&rft.coden=ITWCAX&rft_id=info:doi/10.1109/TWC.2007.060255&rft_dat=%3Cproquest_RIE%3E1671247899%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=864586559&rft_id=info:pmid/&rft_ieee_id=4381422&rfr_iscdi=true |