Lightweight secure group communications for resource constrained devices

被引:10
|
作者
Ben Jaballah, Wafa [1 ]
Mosbah, Mohamed [2 ]
Youssef, Habib [3 ]
Zemmari, Akka [1 ]
机构
[1] Univ Bordeaux, CNRS, LaBRI, 351 Cours Liberat, Talence, France
[2] Polytech Inst Bordeaux, CNRS, LaBRI, Talence, France
[3] Univ Sousse, ISITCOM, Hammam Sousse, Tunisia
关键词
wireless sensor networks; WSNs; source authentication; reputation generator; key binary tree;
D O I
10.1504/IJSSC.2015.073696
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing source authentication service in wireless sensor networks (WSNs) is still a potential stumbling block to the wide deployment of these resource constrained devices. In this paper, we present several broadcast authentication solutions that have been developed for secure group communications in WSNs, and we come up with two novel symmetric-key-based authentication schemes. Our protocols are built upon the integration of a reputation generator on each node, a key binary tree for the efficient distribution and updating of the authentication group keys. Moreover, we refer to a Bloom filter data structure to reduce the communication overhead. We assess the feasibility of our two proposed schemes with a thorough mathematical study, estimating the average number of concatenated message authentication code, the energy consumption overhead, and the probability of detection of two state-of-the-art attacks.
引用
收藏
页码:187 / 200
页数:14
相关论文
共 50 条
  • [1] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    SENSORS, 2020, 20 (13) : 1 - 18
  • [2] A lightweight secure data transmission protocol for resource constrained devices
    Yu, Qian
    Zhang, Chang N.
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (05) : 362 - 370
  • [3] A lightweight secure cyber foraging infrastructure for resource-constrained devices
    Goyal, S
    Carter, J
    SIXTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2004, : 186 - 195
  • [4] An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices
    Rana, Sohel
    Hossain, Saddam
    Shoun, Hasan Imam
    Abul Kashem, Mohammod
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 267 - 275
  • [5] Lightweight Cryptography for Resource Constrained Devices
    Shraddha, B. H.
    Kinnal, Bhagyashree
    Wali, Heera
    Iyer, Nalini C.
    Vishal, P.
    HYBRID INTELLIGENT SYSTEMS, HIS 2021, 2022, 420 : 553 - 564
  • [6] SAFE: Secure and Fast Key Establishment for Resource Constrained Devices in Device to Device Communications
    Kochhar, Mahanya
    Chaudhari, Narendra S.
    Gupta, Shubham
    MACHINE LEARNING, IMAGE PROCESSING, NETWORK SECURITY AND DATA SCIENCES, MIND 2022, PT II, 2022, 1763 : 293 - 307
  • [7] A Secure Authentication Mechanism for Resource Constrained Devices
    Mbarek, Bacem
    Meddeb, Aref
    Ben Jaballah, Wafa
    Mosbah, Mohamed
    2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,
  • [8] A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks
    Ksiazak, Piotr
    Farrelly, William
    Curran, Kevin
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2014, 8 (04) : 62 - 102
  • [9] Lightweight Strong PUF for Resource-Constrained Devices
    Korona, Mateusz
    Giermakowski, Radoslaw
    Biernacki, Mateusz
    Rawski, Mariusz
    ELECTRONICS, 2024, 13 (02)
  • [10] Secure AES hardware module for resource constrained devices
    Trichina, E
    Korkishko, T
    SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 215 - 229