DSBS: A Novel Dependable Secure Broadcast Stream over Lossy Channels

Confidential authenticated broadcast/multi cast over lossy channels is an important and challenging problem. Applications include the continuous confidential authentication of radio and TV internet broadcast/multicast data distribution by satellite and critical data broadcast in critical tasks (e.g. sensor network for military tasks). Main challenges are authenticity, confidentiality, loss-tolerance, efficiency. Asymmetric cryptography approaches have high security but are expensive in computation and communication. In this paper we propose and prototype a novel loss-tolerance mechanism for lossy channels ensuring authenticity, confidentiality, DoS resistance, efficiency and simplicity. Most applications in practice do not need ideal and perfect real-time task and a minor delay around some seconds is completely acceptable, except a few applications such as safety beacons in VANET. In many applications, such as updating code memory of MANET, delay around some minutes is acceptable, too. Hence, our aim is to provide a robust and dependable loss-tolerant secure broadcast stream at cost of delayed-verification. As an experimental implementation we prototype our proposal in a wireless sensor networks to show its efficiency.

[1]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[2]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[3]  John Zic,et al.  A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2009, WiSec '09.

[4]  Shou-Chih Lo,et al.  A Water-Wave Broadcast Scheme for Emergency Messages in VANET , 2013, Wirel. Pers. Commun..

[5]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[6]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[7]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[8]  Sanjay Jha,et al.  Confidential and Secure Broadcast in Wireless Sensor Networks , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[9]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[10]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[11]  Jie Wu,et al.  Secure and reliable broadcasting in wireless sensor networks using multi-parent trees , 2009, Secur. Commun. Networks.

[12]  Syed Taha Ali,et al.  Secure key loss recovery for network broadcast in single-hop wireless sensor networks , 2010, Ad Hoc Networks.

[13]  Ted Taekyoung Kwon,et al.  Secure and Efficient Broadcast Authentication in Wireless Sensor Networks , 2010, IEEE Transactions on Computers.

[14]  David E. Culler,et al.  The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.

[15]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[16]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[17]  Wanlei Zhou,et al.  SpringerBriefs in Computer Science , 2015 .

[18]  Vinton G. Cerf,et al.  Delay-tolerant networking: an approach to interplanetary Internet , 2003, IEEE Commun. Mag..

[19]  John Zic,et al.  Secure Multihop Network Programming with Multiple One-Way Key Chains , 2011, IEEE Trans. Mob. Comput..

[20]  Qun Li,et al.  Global Clock Synchronization in Sensor Networks , 2006, IEEE Trans. Computers.

[21]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[22]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[23]  Matt Welsh,et al.  Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.

[24]  John Zic,et al.  Secure Multihop Network Programming with Multiple One-Way Key Chains , 2008, IEEE Transactions on Mobile Computing.

[25]  Gunnar Karlsson,et al.  Delay-Tolerant Broadcasting , 2006, IEEE Transactions on Broadcasting.

[26]  Sangeetha Manoharan,et al.  Performance Analysis of Subspace Based Downlink Channel Estimation for W-CDMA Systems Using Chaotic Codes , 2013, Wirel. Pers. Commun..

[27]  Sang Hyuk Son,et al.  The price of security in wireless sensor networks , 2010, Comput. Networks.

[28]  Sanjay Jha,et al.  Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..

[29]  Wade Trappe,et al.  Staggered TESLA: a multicast authentication scheme resistant to DoS attacks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[30]  Sofiane Ouni,et al.  Cooperative Association/Re-association Approaches to Optimize Energy Consumption for Real-Time IEEE 802.15.4/ZigBee Wireless Sensor Networks , 2013, Wirel. Pers. Commun..