scispace - formally typeset
Book ChapterDOI

On broadcast authentication in wireless sensor networks

Reads0
Chats0
TLDR
This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes.
Abstract
Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as μTESLA and multilevel μTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks because of the delayed message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the μTESLA-like schemes. Several cryptographic building blocks, including Merkle hash tree and ID-based signature scheme, are adopted to minimize the scheme overhead regarding the costs in both computation and communication. A quantitative analysis on energy consumption of the proposed schemes are given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs.

read more

Citations
More filters
Journal ArticleDOI

Securing wireless sensor networks: a survey

TL;DR: A comprehensive survey of WSNSecurity issues that were investigated by researchers in recent years and that shed light on future directions for WSN security are presented.
Proceedings Article

A Wireless Sensor Network.

TL;DR: Three hardware platforms that addresses the needs of wireless sensor netwoks are presented that produces Operating system concepts for refining concurrency mechanisms and the full realization of the general architecture is represented.
Journal ArticleDOI

Sybil Attacks and Their Defenses in the Internet of Things

TL;DR: This paper defines three types of Sybil attacks: SA-1, SA-2, and SA-3 according to the Sybil attacker's capabilities, and presents some Sybil defense schemes, including social graph-based Sybil detection (SGSD), behavior classification-basedSybil Detection (BCSD), and mobile Sybil Detection with the comprehensive comparisons.
Journal ArticleDOI

Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks

TL;DR: A pair of efficient and light-weight authentication protocols to enable remote WBAN users to anonymously enjoy healthcare service and outperform the existing schemes in terms of better trade-off between desirable security properties and computational overhead, nicely meeting the needs of WBANs.
Journal ArticleDOI

An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid

TL;DR: The proposed authentication scheme considers the smart meters with computation-constrained resources and puts the minimum computation overhead on them and employs the Merkle hash tree technique to secure smart gird communication.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

A survey on sensor networks

TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Book ChapterDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Related Papers (5)