An Improved Scheme of μTESLA Authentication Based Trusted Computing Platform

TESLA protocol is an efficient message authentication protocol which can be used in wireless network. In some instances, however, there are some shortcomings in muTESLA. In this paper, we modify the original protocol from three aspects which can enhance security and availability. At first, separating the data source and key source, using key server to announce the authentication keys and using base station to announce messages, which can increase the difficulty of attacking. Second, the modified scheme supports the authentication of authenticity of key before the re-initialization of key chain, which can avoid the illusive re-keying message and illusive key. Finally, when a key in a node is invalid, the node can re-synchronize the key with key server. Through these ways, the security and availability of the network is enhanced.

[1]  Jean-Claude Laprie,et al.  Dependable computing: concepts, limits, challenges , 1995 .

[2]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[3]  Pankaj Rohatgi,et al.  A compact and fast hybrid signature scheme for multicast packet authentication , 1999, CCS '99.

[4]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[5]  P. Ning,et al.  Multi-Level μ TESLA : Broadcast Authentication for Distributed Sensor Networks , 2004 .

[6]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[7]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[8]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[9]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).

[10]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, CRYPTO.

[11]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[12]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[13]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).