PKC Based Broadcast Authentication using Signature Amortization for WSNs

Public Key Cryptography (PKC) is widely used for broadcast authentication. Intensive use of PKC for broadcast authentication, however, is thought to be expensive to resource constrained sensor nodes. In this paper, we propose a novel PKC based broadcast authentication scheme using signature amortization for Wireless Sensor Networks (WSNs). The proposed scheme exploits only one Elliptic Curve Digital Signature Algorithm (ECDSA) signature to authenticate all broadcast messages. Thus, the overhead for the signature is amortized over all broadcast messages. Besides low overhead, the proposed scheme retains high security that is as strong as conventional PKC based broadcast authentication schemes. Moreover, the proposed scheme can achieve immediate authentication and does not require time synchronization. For the implementation of the proposed scheme, an efficient public key distribution protocol is also presented in this paper. Experimental results of a testbed show that the overhead for authenticating a broadcast message is reduced significantly.

[1]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[2]  Wenjing Lou,et al.  On Broadcast Authentication in Wireless Sensor Networks , 2007 .

[3]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[4]  Qun Li,et al.  Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) , 2006, ICICS.

[5]  Refik Molva,et al.  Efficient Multicast Packet Authentication , 2003, NDSS.

[6]  David E. Culler,et al.  Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[7]  Ted Taekyoung Kwon,et al.  Secure and Efficient Broadcast Authentication in Wireless Sensor Networks , 2010, IEEE Transactions on Computers.

[8]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[9]  Deborah Estrin,et al.  Directed diffusion for wireless sensor networking , 2003, TNET.

[10]  Peng Ning,et al.  Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.

[11]  Edwin K. P. Chong,et al.  Efficient multicast packet authentication using signature amortization , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[12]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[13]  Mohsen Guizani,et al.  Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Communications.

[14]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[15]  Barry E. Mullins,et al.  Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks , 2007, Int. J. Secur. Networks.

[16]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[17]  Rajasekhar Mungara,et al.  A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .

[18]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[19]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, CRYPTO.

[20]  Yang Xiao,et al.  A survey of anonymity in wireless communication systems , 2009, Secur. Commun. Networks.

[21]  Yuguang Fang,et al.  WSN09-1: BABRA: Batch-based Broadcast Authentication in Wireless Sensor Networks , 2006, IEEE Globecom 2006.

[22]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[23]  Mohsen Guizani,et al.  Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks , 2007, IEEE Transactions on Wireless Communications.

[24]  David E. Culler,et al.  The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.

[25]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1999, TNET.

[26]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[27]  Jessica Staddon,et al.  Graph-based authentication of digital streams , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[28]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[29]  Peng Ning,et al.  Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks , 2009, IEEE INFOCOM 2009.

[30]  Jing Deng,et al.  A Distributed Public Key Caching Scheme in Large Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[31]  Yuguang Fang,et al.  BABRA: Batch-based Broadcast Authentication in Wireless Sensor Networks , 2006 .