Browse > Article

An efficient Broadcast Authentication Scheme for Wireless Sensor Networks  

Moon Hyung-Seok (Department of Information and Telecommunication Engineering, Graduate School of Hankuk Aviation University)
Lee Sung-Chang (School of Avionics and Telecommunications, Hankuk Aviation University)
Publication Information
Abstract
It is difficult to apply conventional security algorithms to the wireless sensor networks composed of nodes that have resource constraints such as memory, computing, power resources limitation. Generally, shared key based algorithms with low resource consumption and short key length are used for broadcast packets in authentication of base station. But it is not suitable that all the nodes hold the same shared key only for packet authentication. Recently, broadcast authentication algorithm for sensor network is proposed, which uses key chain generation by one-way hash function, Message Authentication Code generation by each keys of the key chains and delayed key disclosure. It provides suitable authentication method for wireless sensor networks but may leads to inefficient consequence with respect to network conditions such as broadcast ratio, key chain level, and so on. In this paper, we propose an improved broadcast authentication algorithm that uses key chain link and periodical key disclosure. We evaluated the performance of proposed algorithm using TOSSIM(TinyOS Simulator) in TinyOS. The results show that the proposed algorithm ensures low authentication delay, uses memory and computing resource of receiving nodes efficiently and reduces the amount of packet transmitting/receiving.
Keywords
Wireless Sensor Networks; Broadcast Authentication; Message Authentication Code;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Adrian Perrig, Rand Canetti, Dawn Song and J. D. Tygar, 'Efficient and Secure Source Authentication for Multicast', Proceedings of Network and Distributed System Security Symposium. San Diego, California, February, 2001
2 Kris S. J. Pister,. Joe M. Khan, Bernhard E. Boser, 'Smart Dust: Wireless Networks of Millimeter-Scale Sensor Nodes', Highlight Article in 1999 Electronics Research Laboratory Research Summary. 1999
3 Chris Karlof, David Wagner, 'Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures', Proceedings for the first IEEE International Workshop on Sensor Network Protocols and Applications (SNPA 2003), pages 113 -127, May, 2003   DOI
4 Adrian Perrig, R. Canetti, Briscoe, J.D. Tygar, and D. Song, 'TESLA:Multicast source authentication transform'. IRTF draft, draft-irtf-smugtesla-00.txt, November, 2000
5 Chris Karlof, Naveen Sastry, and David Wagner, 'TinySec: A Link Layer Security Architecture for Wireless Sensor Networks'. Proceedings of the 2nd international conference on Embedded networkds sensor systems, pages 132-175, November, 2004
6 Donggang Liu, Peng Ning, 'Multi-Level ${\mu}$ TESLA: A Broadcast Authentication System of Distributed Sensor Networks', ACM Transaction on Embedded Computing Systems (TECS), vol 3, No 4, pages 800-836, November, 2004   DOI
7 Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar, 'SPINS: Security Protocols for Sensor Networks', In Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, Rome, Italy, July 2001   DOI
8 Philip Levis, Nelson Lee, Matt Welsh, and David Culler, 'TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications', Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003), November, 2003   DOI