Efficient User and Broadcast Authentication Scheme for WSNs

被引:0
|
作者
Alabrah, Amerah [1 ,2 ]
Bassiouni, Mostafa [1 ]
机构
[1] Univ Cent Florida, Dept Elect Engn & Comp Sci, Orlando, FL 32816 USA
[2] King Saud Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
WSN; one-way hash chain; SHA-1; MOHC;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks are collections of tiny sensors working collaboratively to gather information. Two major shortcomings of today's WSNs are scarce energy and memory resources making it difficult to devise robust and effective security measures. Keyed-hash chains have been proposed as an efficient solution. Nevertheless, the basic configuration of one-way hash chains, where a shared key is hashed with no limits on the length of the chain causes an unwanted computational overhead and a potential security breach. In this paper, we propose a mini one-way hash chain protocol for user and broadcast authentication that is as effective, while at the same time significantly reducing the computational overhead. We avoid the potential security breach by using easily computed one time authentication tokens to secure communication. We also demonstrate that our protocol is energy preserving, light and efficient. Our simulation and evaluation tests reflect its benefit over straightforwardly configured one-way hash chains.
引用
收藏
页码:3052 / 3057
页数:6
相关论文
共 50 条
  • [1] Energy Efficient and Secure Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
    Maidhili, Siri R.
    Karthik, G. M.
    2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [2] AN EFFICIENT SCHEME FOR BROADCAST AUTHENTICATION IN WIRELESS SENSOR NETWORKS
    Zhang, Jianmin
    Liu, Xiande
    Xu, Haifeng
    2006 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, 2006,
  • [3] An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks
    Mbarek, Bacem
    Meddeb, Aref
    Ben Jaballah, Wafa
    Mosbah, Mohamed
    8TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2017) AND THE 7TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT 2017), 2017, 109 : 553 - 559
  • [4] An efficient message broadcast authentication scheme for sensor networks
    Park, SH
    Kwon, T
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 427 - 432
  • [5] Efficient and secure source authentication scheme for multicast user authentication
    Jeong, Yoon-su
    Lee, Sang-hyuk
    Shin, Seung-soo
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (10) : 2741 - 2746
  • [6] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    JournalofCentralSouthUniversity, 2013, 20 (10) : 2741 - 2746
  • [7] Efficient and secure source authentication scheme for multicast user authentication
    Yoon-su Jeong
    Sang-hyuk Lee
    Seung-soo Shin
    Journal of Central South University, 2013, 20 : 2741 - 2746
  • [8] An Efficient Broadcast Authentication Scheme for Ad Hoc Routing Protocols
    Ramkumar, Mahalingam
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2231 - 2236
  • [9] An Energy Efficient Remote User Authentication Scheme Preserving User Anonymity
    Bapana, Surekha
    Narayana, K. Lakshmi
    Vorugunti, Chandra Sekhar
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1296 - 1301
  • [10] An Efficient Remote User Authentication Scheme with Strong Anonymity
    Liu, Yanfei
    Zhao, Ziming
    Li, Hui
    Luo, Qun
    Yang, Yixian
    PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS, 2008, : 180 - 185