Cargando…
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses ne...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Molecular Diversity Preservation International (MDPI)
2010
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3231227/ https://www.ncbi.nlm.nih.gov/pubmed/22163679 http://dx.doi.org/10.3390/s100908683 |
_version_ | 1782218172715237376 |
---|---|
author | Eldefrawy, Mohamed Hamdy Khan, Muhammad Khurram Alghathbar, Khaled Cho, Eun-Suk |
author_facet | Eldefrawy, Mohamed Hamdy Khan, Muhammad Khurram Alghathbar, Khaled Cho, Eun-Suk |
author_sort | Eldefrawy, Mohamed Hamdy |
collection | PubMed |
description | Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verification. However, it suffers from several flaws considering the delay tolerance, and the chain length restriction. In this paper, we propose a protocol which provides broadcast authentication for wireless sensor networks. This protocol uses a nested hash chain of two different hash functions and the Chinese Remainder Theorem (CRT). The two different nested hash functions are employed for the seed updating and the key generation. Each sensor node is challenged independently with a common broadcasting message using the CRT. Our algorithm provides forward and non-restricted key generation, and in addition, no time synchronization is required. Furthermore, receivers can instantly authenticate packets in real time. Moreover, the comprehensive analysis shows that this scheme is efficient and practical, and can achieve better performance than the μTESLA system. |
format | Online Article Text |
id | pubmed-3231227 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2010 |
publisher | Molecular Diversity Preservation International (MDPI) |
record_format | MEDLINE/PubMed |
spelling | pubmed-32312272011-12-07 Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem Eldefrawy, Mohamed Hamdy Khan, Muhammad Khurram Alghathbar, Khaled Cho, Eun-Suk Sensors (Basel) Article Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verification. However, it suffers from several flaws considering the delay tolerance, and the chain length restriction. In this paper, we propose a protocol which provides broadcast authentication for wireless sensor networks. This protocol uses a nested hash chain of two different hash functions and the Chinese Remainder Theorem (CRT). The two different nested hash functions are employed for the seed updating and the key generation. Each sensor node is challenged independently with a common broadcasting message using the CRT. Our algorithm provides forward and non-restricted key generation, and in addition, no time synchronization is required. Furthermore, receivers can instantly authenticate packets in real time. Moreover, the comprehensive analysis shows that this scheme is efficient and practical, and can achieve better performance than the μTESLA system. Molecular Diversity Preservation International (MDPI) 2010-09-17 /pmc/articles/PMC3231227/ /pubmed/22163679 http://dx.doi.org/10.3390/s100908683 Text en © 2010 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/). |
spellingShingle | Article Eldefrawy, Mohamed Hamdy Khan, Muhammad Khurram Alghathbar, Khaled Cho, Eun-Suk Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem |
title | Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem |
title_full | Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem |
title_fullStr | Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem |
title_full_unstemmed | Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem |
title_short | Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem |
title_sort | broadcast authentication for wireless sensor networks using nested hashing and the chinese remainder theorem |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3231227/ https://www.ncbi.nlm.nih.gov/pubmed/22163679 http://dx.doi.org/10.3390/s100908683 |
work_keys_str_mv | AT eldefrawymohamedhamdy broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem AT khanmuhammadkhurram broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem AT alghathbarkhaled broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem AT choeunsuk broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem |