Maximum Life-time Broadcast Authentication Protocol for Wireless Sensor Networks
نویسندگان
چکیده
Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows a sender to broadcast messages to multiple nodes in an authenticated way. Symmetric key based schemes such as μTESLA and μTESLA-like schemes have been proposed to provide such services for WSNs, however, the life-time of these schemes is constrained by the length of the key chains. To address this problem, this paper propose a light-weight, scalable broadcast authentication scheme. In this paper, the proposed scheme uses series of short key chains that let the fore key chain to carry the Commitment Distribution Message (CDM) of the following key chain and amortize the CDM over multiple small parts to minimize the communication overhead. This allows the short key chains to continue indefinitely. Moreover, the comprehensive analysis shows that this scheme is efficient and robust against packet loss, and leads to efficient solution to the raised problems.
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملAn Adaptive Congestion Alleviating Protocol for Healthcare Applications in Wireless Body Sensor Networks: Learning Automata Approach
Wireless Body Sensor Networks (WBSNs) involve a convergence of biosensors, wireless communication and networks technologies. WBSN enables real-time healthcare services to users. Wireless sensors can be used to monitor patients’ physical conditions and transfer real time vital signs to the emergency center or individual doctors. Wireless networks are subject to more packet loss and congestion. T...
متن کامل