Multi-source broadcast authentication with Combined Key Chains for wireless ad hoc networks

Multiple trust sources may be needed for broadcast in wireless ad hoc networks. For example, multiple base stations may be employed in some wireless sensor networks, or multiple trusts may be distributed among multiple routing nodes in multi-hop routing protocol. Most of the previously proposed multicast/broadcast authentication protocols assume a single source of trust. With multiple trust sources, it becomes difficult to design resource-efficient authentication protocols for multicast/broadcast services. Simply extending traditional approaches will result in increased bandwidth and memory consumptions in proportion to the number of trust sources. In this paper, we propose a new scheme utilizing Combined Key Chains. If there are m trust sources, our scheme generates m + 1 key chains, where m of them are distributed among the m source nodes and the last one is used as a Verification Key Chain in all the receiver nodes. The communication overhead is small and constant, and the memory requirement at a verifier node is also minimal. Copyright © 2014 John Wiley & Sons, Ltd.

[1]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[2]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[3]  Yong Wang,et al.  A Key Management Protocol for Wireless Sensor Networks with Multiple Base Stations , 2008, 2008 IEEE International Conference on Communications.

[4]  Sushil Jajodia,et al.  Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation , 2009, IEEE Transactions on Vehicular Technology.

[5]  Milind Dawande,et al.  Energy efficient schemes for wireless sensor networks with multiple mobile base stations , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[6]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[7]  Donggang Liu,et al.  Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.

[8]  Layuan Li,et al.  Multihop Routing Protocol with Unequal Clustering for Wireless Sensor Networks , 2008, 2008 ISECS International Colloquium on Computing, Communication, Control, and Management.

[9]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[10]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[11]  Yue Wu,et al.  A Survey on Key Management for Multicast , 2010, 2010 Second International Conference on Information Technology and Computer Science.

[12]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[13]  Roberto Di Pietro,et al.  LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[14]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[15]  Yue Wu,et al.  A hierarchical key management scheme for large and dynamic multicast groups , 2009, 2009 International Conference on Apperceiving Computing and Intelligence Analysis.

[16]  Seungjin Park,et al.  Hop-Count based location discovery in ad hoc sensor networks , 2004 .

[17]  P. Ning,et al.  Multi-Level μ TESLA : A Broadcast Authentication System for Distributed Sensor Networks ∗ , 2003 .

[18]  Jaydip Sen A Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks , 2010, 2010 Second International Conference on Computational Intelligence, Modelling and Simulation.

[19]  Shivakant Mishra,et al.  Enhancing Base Station Security in Wireless Sensor Networks , 2003 .

[20]  Ben-Jye Chang,et al.  Markov Chain-Based Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad Hoc Networks , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[21]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[22]  Markus Jakobsson,et al.  Almost Optimal Hash Sequence Traversal , 2002, Financial Cryptography.

[23]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[24]  B. Parvathavarthini,et al.  An efficient cluster based key management scheme for MANET with authentication , 2010, Trendz in Information Sciences & Computing(TISC2010).

[25]  Henrik Tange,et al.  Attacks and countermeasures on AES and ECC , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).

[26]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.