Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
نویسندگان
چکیده
منابع مشابه
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verifi...
متن کاملHybrid Multi-user Broadcast Authentication for Wireless Sensor Networks
In wireless sensor networks (WSNs), broadcast authentication allows only legitimate users (or senders) to disseminate messages into the networks. μTESLA [14] is the first broadcast authentication scheme for WSNs. It allows only few users, mainly several base stations, to broadcast messages, but in reality there are many scenarios that require a large number of dynamic users (mobile sinks or use...
متن کاملAccelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks
In wireless sensor networks (WSNs), broadcast authentication is a crucial security mechanism that allows a multitude of legitimate users to join in and disseminate messages into the networks in a dynamic and authenticated way. During the past few years, several public-key based multi-user broadcast authentication schemes have been proposed to achieve immediate authentication and to address the ...
متن کاملMaximum Life-time Broadcast Authentication Protocol for Wireless Sensor Networks
Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows a sender to broadcast messages to multiple nodes in an authenticated way. Symmetric key based schemes such as μTESLA and μTESLA-like schemes have been proposed to provide such services for WSNs, however, the life-time of these schemes is constrained by the length of the key chains. To addres...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2010
ISSN: 1424-8220
DOI: 10.3390/s100908683