Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
Keywords:
Broadcast authentication, multi user, securityAbstract
Multi-user broadcast authentication is an important security service in wireless sensor networks (WSNs), as it allows a large number of mobile users of the WSNs to join in and broadcast messages to WSNs dynamically and authentically. To reduce communication cost due to the transmission of public-key certificates, broadcast authentication schemes based on identity (ID)- based cryptography have been proposed, but the schemes suffer from expensive pairing computations. In this paper, to minimize computation and communication costs, we propose a new provably secure pairing-free ID-based signature schemes with message recovery, MR-IBS, and PMR-IBS. We then construct an IDbased multi-user broadcast authentication scheme, BASIS, based on MR-IBS and PMR-IBS for broadcast authentication between users and a sink. We evaluate the practical feasibility of BASIS on WSN hardware platforms, MICAz and Tmote Sky are used in real-life deployments in terms of computation/communication cost and energy consumption. Consequently, BASIS reduces the total energy consumption on Tmote Sky by up to 72% and 17% compared with Bloom filter-based authentication scheme based on a variant of ECDSA with message recovery and IMBAS based on a ID-based signature scheme with message appendix, respectively.
References
- K. Ren, W. Lou, and Y. Zhang, “Multi-user broadcast authentication in wireless sensor networks,” in Proc. SECON, San Diego, CA, Jun. 2007, 223-232.
- I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Commun. Mag., vol. 40, no. 8, pp. 102-114, Aug. 2002.
- I. Akyildiz and I. Kasimoglu, “Wireless sensor and actor networks: Re-search challenges,” Ad Hoc Netw., vol. 2, no. 4, pp. 351-367, Oct. 2004.
- K. Ren and W. Lou, Communication Security in Wireless Sensor Net-works. Saarbrücken, Germany: VDM Verlag, 2008.
- K. Ren, W. Lou, and Y. Zhang, “LEDS: Providing location-aware end-to-end data security in wireless sensor networks,” IEEE Trans. Mobile Comput., vol. 7, no. 5, pp. 585-598, May 2008.
- Q. Wang, K. Ren, W. Lou, and Y. Zhang, “Dependable and secure sensor data storage with dynamic integrity assurance,” in Proc. IEEE INFOCOM, 2009, to be published.
- S. Yu, K. Ren, and W. Lou, “FDAC: Toward fine-grained distributed data access control in wireless sensor networks,” in Proc. IEEE INFOCOM, 2009, to be published.
- R. Zhang, Y. Zhang, and K. Ren, “DP2AC: Distributed privacy-preserving access control in sensor networks,” in Proc. IEEE INFOCOM, 2009, to be published.
- C. Lu, G. Xing, O. Chipara, C. Fok, and S. Bhattacharya, “A spatiotem-poral query service for mobile users in sensor networks,” in Proc. ICDCS, Washington, DC, Jun. 2005, pp. 381-390.
- A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, “SPINS: Se-curity protocols for sensor networks,” in Proc. MobiCom, Rome, Italy, Jul. 2001, pp. 189-199.
- D. Liu and P. Ning, “Multi-level mTESLA: Broadcast authentication for distributed sensor networks,” ACM Trans. Embed. Comput. Syst., vol. 3, no. 4, pp. 800-836, Nov. 2004.
- D. Liu, P. Ning, S. Zhu, and S. Jajodia, “Practical broadcast authenti-cation in sensor networks,” in Proc. MobiQuitous, San Diego, CA, Jul. 2005, pp. 118-132.
- Y. Hu, A. Perrig, and D. Johnson, “Packet leashes: A defense against wormhole attacks in wireless ad hoc networks,” in Proc. INFOCOM, San Francisco, CA, Apr. 2003, pp. 1976-1986.
- A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, “Energy analysis of public-key cryptography on small wireless devices,” in Proc. IEEE PerCom, Kauai, HI, Mar. 2005, pp. 324-328.
- W. Du, R. Wang, and P. Ning, “An efficient scheme for authenticating public keys in sensor networks,” in Proc. MobiHoc, Urbana-Champaign, IL, May 2005, pp. 58-67.
- K. Ren, K. Zeng, W. Lou, and P. Moran, “On broadcast authentication in wireless sensor networks,” IEEE Trans. Wireless Commun., vol. 6, no. 11, 4136-4144, Nov. 2007.
- Wireless Sensor Networks, Crossbow Technol. Inc., San Jose, CA, 2004. [Online]. Available: http://www.xbow.com/
- MSP430 Family of Ultra-Lowpower 16-bit RISC Processors, Texas In-struments Inc., Dallas, TX. [Online]. Available: http://www.ti.com
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.