Long Duration Broadcast Authentication for Wireless Sensor Networks

被引:3
|
作者
Liu, Yongsheng [1 ]
Li, Jie [1 ]
Guo, Minyi [2 ]
机构
[1] Univ Tsukuba, Grad Sch Syst & Informat Engn, Tsukuba, Ibaraki 3058573, Japan
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
关键词
D O I
10.1109/VETECS.2012.6240214
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In the resource constrained Wireless Sensor Networks (WSNs), the broadcast authentication is widely fulfilled by the emerging delayed authentication technique. The one level backward one-way key chain in the delayed authentication technique limits heavily the duration of the broadcast authentication. In this paper, we propose a long duration broadcast authentication scheme for WSNs. The proposed scheme uses a novel hierarchical key chain to extend the duration of broadcast authentication to be as long as the whole lifetime of WSNs. Moreover, the overhead of the proposed scheme is significantly reduced compared to that with one level key chain. Extensive experimental results show that the novel hierarchical key chain fully outperforms the one level key chain in terms of memory and computation.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Fast Response PKC-Based Broadcast Authentication in Wireless Sensor Networks
    Panoat Chuchaisri
    Richard Newman
    Mobile Networks and Applications, 2012, 17 : 508 - 525
  • [32] An Efficient and Provably-Secure Broadcast Authentication Scheme in Wireless Sensor Networks
    Guo, Rui
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    Zhao, Jing
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (06): : 977 - 985
  • [33] A Mutual Broadcast Authentication Protocol for Wireless Sensor Networks Based on Fourier Series
    Wang, Xiaogang
    Shi, Weiren
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [34] A survey of broadcast authentication schemes for wireless networks
    Grover, Kanika
    Lim, Alvin
    AD HOC NETWORKS, 2015, 24 : 288 - 316
  • [35] Practical broadcast authentication protocol for sensor networks
    Du Z.-Q.
    Shen Y.-L.
    Ma J.-F.
    Zhou L.-H.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2010, 37 (02): : 305 - 310+325
  • [36] εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
    Shim, Kyung-Ah
    Lee, Young-Ran
    Park, Cheol-Min
    AD HOC NETWORKS, 2013, 11 (01) : 182 - 189
  • [37] Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
    Eldefrawy, Mohamed Hamdy
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    Cho, Eun-Suk
    SENSORS, 2010, 10 (09) : 8683 - 8695
  • [38] BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
    Shim, Kyung-Ah
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (07) : 1545 - 1554
  • [39] CRTBA: Chinese Remainder Theorem-Based Broadcast Authentication in Wireless Sensor Networks
    Zhang, Jianmin
    Yu, Wenqi
    Liu, Xiande
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 846 - +
  • [40] Security issues in Wireless Sensor Network Broadcast Authentication
    Raza, Asad
    Abu Romman, Ali
    Qureshi, Muhammad Faheem
    2019 2ND INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2019, : 195 - 201