Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks

Authors

  • Yenumala Sankara Rao  Associate Professor, Department of Mca, St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India
  • Khareedu Sairam  PG Students, Department of Mca, St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India

Keywords:

Broadcast authentication, multi user, security

Abstract

Multi-user broadcast authentication is an important security service in wireless sensor networks (WSNs), as it allows a large number of mobile users of the WSNs to join in and broadcast messages to WSNs dynamically and authentically. To reduce communication cost due to the transmission of public-key certificates, broadcast authentication schemes based on identity (ID)- based cryptography have been proposed, but the schemes suffer from expensive pairing computations. In this paper, to minimize computation and communication costs, we propose a new provably secure pairing-free ID-based signature schemes with message recovery, MR-IBS, and PMR-IBS. We then construct an IDbased multi-user broadcast authentication scheme, BASIS, based on MR-IBS and PMR-IBS for broadcast authentication between users and a sink. We evaluate the practical feasibility of BASIS on WSN hardware platforms, MICAz and Tmote Sky are used in real-life deployments in terms of computation/communication cost and energy consumption. Consequently, BASIS reduces the total energy consumption on Tmote Sky by up to 72% and 17% compared with Bloom filter-based authentication scheme based on a variant of ECDSA with message recovery and IMBAS based on a ID-based signature scheme with message appendix, respectively.

References

  1. K. Ren, W. Lou, and Y. Zhang, “Multi-user broadcast authentication in wireless sensor networks,” in Proc. SECON, San Diego, CA, Jun. 2007, 223-232.
  2. I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Commun. Mag., vol. 40, no. 8, pp. 102-114, Aug. 2002.
  3. I. Akyildiz and I. Kasimoglu, “Wireless sensor and actor networks: Re-search challenges,” Ad Hoc Netw., vol. 2, no. 4, pp. 351-367, Oct. 2004.
  4. K. Ren and W. Lou, Communication Security in Wireless Sensor Net-works. Saarbrücken, Germany: VDM Verlag, 2008.
  5. K. Ren, W. Lou, and Y. Zhang, “LEDS: Providing location-aware end-to-end data security in wireless sensor networks,” IEEE Trans. Mobile Comput., vol. 7, no. 5, pp. 585-598, May 2008.
  6. Q. Wang, K. Ren, W. Lou, and Y. Zhang, “Dependable and secure sensor data storage with dynamic integrity assurance,” in Proc. IEEE INFOCOM, 2009, to be published.
  7. S. Yu, K. Ren, and W. Lou, “FDAC: Toward fine-grained distributed data access control in wireless sensor networks,” in Proc. IEEE INFOCOM, 2009, to be published.
  8. R. Zhang, Y. Zhang, and K. Ren, “DP2AC: Distributed privacy-preserving access control in sensor networks,” in Proc. IEEE INFOCOM, 2009, to be published.
  9. C. Lu, G. Xing, O. Chipara, C. Fok, and S. Bhattacharya, “A spatiotem-poral query service for mobile users in sensor networks,” in Proc. ICDCS, Washington, DC, Jun. 2005, pp. 381-390.
  10. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, “SPINS: Se-curity protocols for sensor networks,” in Proc. MobiCom, Rome, Italy, Jul. 2001, pp. 189-199.
  11. D. Liu and P. Ning, “Multi-level mTESLA: Broadcast authentication for distributed sensor networks,” ACM Trans. Embed. Comput. Syst., vol. 3, no. 4, pp. 800-836, Nov. 2004.
  12. D. Liu, P. Ning, S. Zhu, and S. Jajodia, “Practical broadcast authenti-cation in sensor networks,” in Proc. MobiQuitous, San Diego, CA, Jul. 2005, pp. 118-132.
  13. Y. Hu, A. Perrig, and D. Johnson, “Packet leashes: A defense against wormhole attacks in wireless ad hoc networks,” in Proc. INFOCOM, San Francisco, CA, Apr. 2003, pp. 1976-1986.
  14. A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, “Energy analysis of public-key cryptography on small wireless devices,” in Proc. IEEE PerCom, Kauai, HI, Mar. 2005, pp. 324-328.
  15. W. Du, R. Wang, and P. Ning, “An efficient scheme for authenticating public keys in sensor networks,” in Proc. MobiHoc, Urbana-Champaign, IL, May 2005, pp. 58-67.
  16. K. Ren, K. Zeng, W. Lou, and P. Moran, “On broadcast authentication in wireless sensor networks,” IEEE Trans. Wireless Commun., vol. 6, no. 11, 4136-4144, Nov. 2007.
  17. Wireless Sensor Networks, Crossbow Technol. Inc., San Jose, CA, 2004. [Online]. Available: http://www.xbow.com/
  18. MSP430 Family of Ultra-Lowpower 16-bit RISC Processors, Texas In-struments Inc., Dallas, TX. [Online]. Available: http://www.ti.com

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Yenumala Sankara Rao, Khareedu Sairam, " Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1682-1687, January-February-2018.