Book ChapterDOI
On broadcast authentication in wireless sensor networks
Kui Ren,Kai Zeng,Wenjing Lou,Patrick J. Moran +3 more
- pp 502-514
Reads0
Chats0
TLDR
This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the muTESLA-like schemes.Abstract:
Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast the WSN in an authenticated way. Symmetric key based schemes such as μTESLA and multilevel μTESLA have been proposed to provide such services for WSNs; however, these schemes all suffer from serious DoS attacks because of the delayed message authentication. This paper presents several effective public key based schemes to achieve immediate broadcast authentication and thus overcome the vulnerability presented in the μTESLA-like schemes. Several cryptographic building blocks, including Merkle hash tree and ID-based signature scheme, are adopted to minimize the scheme overhead regarding the costs in both computation and communication. A quantitative analysis on energy consumption of the proposed schemes are given in detail. We believe that this paper can serve as the start point towards fully solving the important multisender broadcast authentication problem in WSNs.read more
Citations
More filters
Journal ArticleDOI
Securing wireless sensor networks: a survey
TL;DR: A comprehensive survey of WSNSecurity issues that were investigated by researchers in recent years and that shed light on future directions for WSN security are presented.
Proceedings Article
A Wireless Sensor Network.
TL;DR: Three hardware platforms that addresses the needs of wireless sensor netwoks are presented that produces Operating system concepts for refining concurrency mechanisms and the full realization of the general architecture is represented.
Journal ArticleDOI
Sybil Attacks and Their Defenses in the Internet of Things
TL;DR: This paper defines three types of Sybil attacks: SA-1, SA-2, and SA-3 according to the Sybil attacker's capabilities, and presents some Sybil defense schemes, including social graph-based Sybil detection (SGSD), behavior classification-basedSybil Detection (BCSD), and mobile Sybil Detection with the comprehensive comparisons.
Journal ArticleDOI
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks
TL;DR: A pair of efficient and light-weight authentication protocols to enable remote WBAN users to anonymously enjoy healthcare service and outperform the existing schemes in terms of better trade-off between desirable security properties and computational overhead, nicely meeting the needs of WBANs.
Journal ArticleDOI
An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid
TL;DR: The proposed authentication scheme considers the smart meters with computation-constrained resources and puts the minimum computation overhead on them and employs the Merkle hash tree technique to secure smart gird communication.
References
More filters
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI
A survey on sensor networks
TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Book ChapterDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
Book ChapterDOI
Identity-based cryptosystems and signature schemes
TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.