An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs)

In wireless sensor networks (WSNs), users can use broadcast authentication mechanisms to connect to the target network and disseminate their messages within the network. Since data transfer for sensor networks is wireless, as a result, attackers can easily eavesdrop deployed sensor nodes and the data sent between them or modify the content of eavesdropped data and inject false data into the sensor network. Hence, the implementation of the message authentication mechanisms (in order to avoid changes and injecting messages into the network) of wireless sensor networks is essential. In this paper, we present an improved protocol based on elliptic curve cryptography (ECC) to accelerate authentication of multi-user message broadcasting. In comparison with previous ECC-based schemes, complexity and computational overhead of proposed scheme is significantly decreased. Also, the proposed scheme supports user anonymity, which is an important property in broadcast authentication schemes for WSNs to preserve user privacy and user untracking.

[1]  Li Xu,et al.  Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems , 2014, IEEE Transactions on Parallel and Distributed Systems.

[2]  Morteza Nikooghadam,et al.  A Protocol for Digital Signature Based on the Elliptic Curve Discrete Logarithm Problem , 2008 .

[3]  Ian F. Akyildiz,et al.  Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.

[4]  Yookun Cho,et al.  HORSIC: An efficient one-time signature scheme for wireless sensor networks , 2012, Inf. Process. Lett..

[5]  Bin Zhao,et al.  IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks , 2008, Comput. Commun..

[6]  G. Meurice De Dormale,et al.  Area and time trade-offs for iterative modular division over GF(2 m ): novel algorithm and implementations on FPGA , 2007 .

[7]  Wenjing Lou,et al.  Communication Security in Wireless Sensor Networks , 2008 .

[8]  Ping Wang,et al.  Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound , 2018, IEEE Transactions on Dependable and Secure Computing.

[9]  Bao Li,et al.  An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[10]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[11]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[12]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[13]  Ping Wang,et al.  On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions , 2014, Comput. Networks.

[14]  Jianhua Li,et al.  Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards , 2010, IEEE Transactions on Industrial Electronics.

[15]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[16]  Ping Wang,et al.  Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment , 2015, IEEE Transactions on Dependable and Secure Computing.

[17]  Peng Ning,et al.  Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.

[18]  Min-Shiang Hwang,et al.  Improvement of signature scheme based on factoring and discrete logarithms , 2005, Appl. Math. Comput..

[19]  Joo-Seok Song,et al.  Knowledge-proof based versatile smart card verification protocol , 2000, CCRV.

[20]  Matt Welsh,et al.  Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.

[21]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[22]  Yuguang Fang,et al.  BABRA: Batch-based Broadcast Authentication in Wireless Sensor Networks , 2006 .

[23]  Kefa Rabah Elliptic Curve ElGamal Encryption and Signature Schemes , 2005 .

[24]  Leonid Reyzin,et al.  Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying , 2002, ACISP.

[25]  Shiuh-Pyng Shieh,et al.  An efficient broadcast authentication scheme in wireless sensor networks , 2006, ASIACCS '06.

[26]  Wenjing Lou,et al.  Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[27]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[28]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[29]  Wenjing Lou,et al.  On Broadcast Authentication in Wireless Sensor Networks , 2007 .

[30]  Yuan Xue,et al.  A FAST AND EFFICIENT SOURCE AUTHENTICATION SOLUTION FOR BROADCASTING IN WIRELESS SENSOR NETWORKS , 2007 .

[31]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[32]  Kazukuni Kobara,et al.  Lightweight Broadcast Authentication Protocols Reconsidered , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[33]  Yu-Fang Chung,et al.  ID-based digital signature scheme on the elliptic curve cryptosystem , 2007, Comput. Stand. Interfaces.

[34]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[35]  Hu Junru The improved elliptic curve digital signature algorithm , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.

[36]  Peng Ning,et al.  An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.

[37]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[38]  P. Ning,et al.  Multi-Level μ TESLA : Broadcast Authentication for Distributed Sensor Networks , 2004 .

[39]  Sushil Jajodia,et al.  Practical broadcast authentication in sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[40]  Xiaoni Du,et al.  A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..