Data Authentication Model Based on Reed-solomon Error-correcting Codes in Wireless Sensor Networks

Abstract We consider the problem of authenticating the packets transmitted over a Wireless Sensor Networks (WSN) controlled by an adversary who may perform arbitrary attacks on the packets: He may drop or modify the chosen packets. The prior works on the data authentication problem of WSN have focused on a less powerful adversarial network model or have examined a considerably more restrictive setting with specific timing or structural assumptions about WSN. We also model the ability of WSN to modify a data of n packets with a parameter: the survival rate α (0 < α≤ 1) denoting the fraction of the packets that are guaranteed to reach any particular receiver unmodified. Combining error-correcting codes with standard cryptographic primitives, our approach gives almost the same security guarantees as if each packet was individually signed, but requires only one signature operation for the entire data and adds to each transmitted packet only a small amount of authentication information. We prove the security and correctness of our scheme and analyze its performance in terms of communication overhead and computational effort at the sender and the receiver. We also compare our scheme with other typical data authentication model of WSN, and the results show that our scheme not only provides the authenticity authentication, but also has the lower overhead. Therefore, our model is suitable for application in large-scale WSN.

[1]  Adrian Perrig,et al.  Flooding-resilient broadcast authentication for VANETs , 2011, MobiCom.

[2]  Jianer Chen,et al.  Efficient flooding in Wireless Sensor Networks secured with neighborhood keys , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[3]  Haiyun Luo,et al.  Denial of service attack-resistant flooding authentication in wireless sensor networks , 2010, Comput. Commun..

[4]  ZhangJun,et al.  Research on anonymous signatures and group signatures , 2008 .

[5]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[6]  Jinsang Kim,et al.  Step-by-Step Approach for Energy-Efficient Wireless Sensor Network , 2012 .

[7]  Joseph M. Hellerstein,et al.  Clock Skew Based Node Identification in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[8]  Xu Jian,et al.  Hierarchical Hash List for Distributed Query Authentication , 2012 .

[9]  Alex X. Liu,et al.  SafeQ: Secure and Efficient Query Processing in Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[10]  Claude Castelluccia,et al.  Toward clock skew based wireless sensor node services , 2010, 2010 The 5th Annual ICST Wireless Internet Conference (WICON).

[11]  Orhan Dagdeviren,et al.  A Survey of Agent Technologies for Wireless Sensor Networks , 2011 .

[12]  Roberto Tamassia,et al.  Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures , 2007, ICICS.

[13]  JiangHong Guo,et al.  Efficient and Reliable Broadcast Protocol for Clustered Wireless Sensor Networks , 2010, 2010 International Conference on Computational Intelligence and Security.

[14]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, Inf. Comput..

[15]  Llanos Tobarra,et al.  Formal Analysis of Sensor Network Encryption Protocol (SNEP) , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[16]  Zhu Zhiliang Data outsourcing authentication model based on authenticated data structures for cloud computing , 2011 .