Multi-sender Broadcast Authentication in Wireless Sensor Networks

Broadcast authentication, a fundamental feature in wireless sensor networks (WSNs), enables users to broadcast to multiple sensor nodes in an authenticated way. Symmetric-key-based μTESLA-like schemes are a popular solution due to their energy efficiency, but most schemes are not scalable (e.g. in terms of the number of senders). On the other hand, several schemes based on public key cryptography (PKC) are proposed to secure the multi-user broadcast in WSNs. However, the computation and communication overheads in the underlying PKC infrastructure restrict its implementation in resource-constrained WSNs. This paper presents an efficient scheme, which supports multi-sender broadcast authentication and allows dynamic addition of new senders. We delay disclosing the keys of the master key chain generated by the base station to authenticate the commitment of each sender's key chain. Considering that senders may be captured and compromised by adversaries in a hostile environment, our scheme also provides a mechanism to revoke the compromised senders' broadcast authentication capability.

[1]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[2]  Wenjing Lou,et al.  On Broadcast Authentication in Wireless Sensor Networks , 2007 .

[3]  Donggang Liu,et al.  Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.

[4]  Adrian Perrig,et al.  Seven cardinal properties of sensor network broadcast authentication , 2006, SASN '06.

[5]  Donggang Liu,et al.  Security for Wireless Sensor Networks , 2006, Advances in Information Security.

[6]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[7]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[8]  Sushil Jajodia,et al.  Practical broadcast authentication in sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[9]  Qijun Gu,et al.  Localized Broadcast Authentication in Large Sensor Networks , 2006, International conference on Networking and Services (ICNS'06).

[10]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[11]  Bin Zhao,et al.  IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks , 2008, Comput. Commun..

[12]  Wenjing Lou,et al.  Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[13]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[14]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[15]  Kyung-Ah Shim,et al.  EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks , 2013, Ad Hoc Networks.

[16]  Wenjing Lou,et al.  On Broadcast Authentication in Wireless Sensor Networks , 2006, IEEE Transactions on Wireless Communications.

[17]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[18]  Wenjing Lou,et al.  Communication Security in Wireless Sensor Networks , 2008 .