Optimized Hash Tree for Authentication in Sensor Networks
暂无分享,去创建一个
Authentication based on the Merkle tree has been proposed as an energy efficient approach in a resource constrained sensor network environment. It replaces complicated certificate verification with more power efficient hash computations. While previous works assumed complete binary Merkle tree structures, which can be used efficiently only in sensor networks with a specific number of sensor nodes, we investigate incomplete Merkle trees to support any number of sensors. For the incomplete Merkle tree, we demonstrate that an optimal structure can be found through mathematical analysis and simulation. A novel tree indexing scheme is also proposed to reduce communication overhead and save sensors resources during authentication
[1] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.
[2] Markus Jakobsson,et al. Efficient attribute authentication with applications to ad hoc networks , 2004, VANET '04.
[3] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[4] Chinya V. Ravishankar,et al. Dynamic Merkle Trees for Verifying Privileges in Sensor Networks , 2006, 2006 IEEE International Conference on Communications.