Feasibility of Rainbow Signature for Broadcast Authentication in Sensor Networks

An authentication technique allows node to dynamically join the network, sense data and transmit authenticated data before going back to sleep. All the existing cryptosystems suffer from high computation or communication overhead, delayed authentication, severe energy diminution attacks and lack of scalability. The lack of efficiency, scalability or security can be attributed to the standard cryptographic primitives employed by the protocols. In this paper, Rainbow multivariate signature is proposed and explored as an alternative cryptographic mechanism for message authentication in Wireless sensor networks (WSN). The Rainbow class of signatures has been found to be suitable for resource scarce systems although the key size is large. The work determines the efficacy of this signature in a WSN environment by finding the computational and communication overheads due to the signature. Simulation shows that there is a significant increase in delay and queue size with a corresponding delay in the message throughput. However, the computational needs, the delay and throughput penalties are within tolerable limits even when the network density increases significantly. This shows that Rainbow signature can be used as an underlying cryptographic mechanism for efficient and scalable authentication protocols.

[1]  Olivier Billet,et al.  Cryptanalysis of Rainbow , 2006, SCN.

[2]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[3]  Wenjing Lou,et al.  Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[4]  Jacques Stern,et al.  An Efficient Provable Distinguisher for HFE , 2006, ICALP.

[5]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[6]  Benjamin Arazi Message Authentication in Computationally Constrained Environments , 2009, IEEE Transactions on Mobile Computing.

[7]  Faramarz Fekri,et al.  Public-key cryptography using paraunitary matrices , 2006, IEEE Transactions on Signal Processing.

[8]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[9]  Chen-Mou Cheng,et al.  New Differential-Algebraic Attacks and Reparametrization of Rainbow , 2008, ACNS.

[10]  Seung-Woo Seo,et al.  Optimized Hash Tree for Authentication in Sensor Networks , 2007, IEEE Communications Letters.

[11]  Jintai Ding,et al.  Secure Electronic Voting , 2006, Advances in Information Security.

[12]  Louis Goubin,et al.  C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai , 1998, ASIACRYPT.

[13]  Bart Preneel,et al.  A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes , 2005, CT-RSA.

[14]  Faramarz Fekri,et al.  A multivariate key-establishment scheme for wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.