Cargando…

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem

Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses ne...

Descripción completa

Detalles Bibliográficos
Autores principales: Eldefrawy, Mohamed Hamdy, Khan, Muhammad Khurram, Alghathbar, Khaled, Cho, Eun-Suk
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Molecular Diversity Preservation International (MDPI) 2010
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3231227/
https://www.ncbi.nlm.nih.gov/pubmed/22163679
http://dx.doi.org/10.3390/s100908683
_version_ 1782218172715237376
author Eldefrawy, Mohamed Hamdy
Khan, Muhammad Khurram
Alghathbar, Khaled
Cho, Eun-Suk
author_facet Eldefrawy, Mohamed Hamdy
Khan, Muhammad Khurram
Alghathbar, Khaled
Cho, Eun-Suk
author_sort Eldefrawy, Mohamed Hamdy
collection PubMed
description Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verification. However, it suffers from several flaws considering the delay tolerance, and the chain length restriction. In this paper, we propose a protocol which provides broadcast authentication for wireless sensor networks. This protocol uses a nested hash chain of two different hash functions and the Chinese Remainder Theorem (CRT). The two different nested hash functions are employed for the seed updating and the key generation. Each sensor node is challenged independently with a common broadcasting message using the CRT. Our algorithm provides forward and non-restricted key generation, and in addition, no time synchronization is required. Furthermore, receivers can instantly authenticate packets in real time. Moreover, the comprehensive analysis shows that this scheme is efficient and practical, and can achieve better performance than the μTESLA system.
format Online
Article
Text
id pubmed-3231227
institution National Center for Biotechnology Information
language English
publishDate 2010
publisher Molecular Diversity Preservation International (MDPI)
record_format MEDLINE/PubMed
spelling pubmed-32312272011-12-07 Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem Eldefrawy, Mohamed Hamdy Khan, Muhammad Khurram Alghathbar, Khaled Cho, Eun-Suk Sensors (Basel) Article Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verification. However, it suffers from several flaws considering the delay tolerance, and the chain length restriction. In this paper, we propose a protocol which provides broadcast authentication for wireless sensor networks. This protocol uses a nested hash chain of two different hash functions and the Chinese Remainder Theorem (CRT). The two different nested hash functions are employed for the seed updating and the key generation. Each sensor node is challenged independently with a common broadcasting message using the CRT. Our algorithm provides forward and non-restricted key generation, and in addition, no time synchronization is required. Furthermore, receivers can instantly authenticate packets in real time. Moreover, the comprehensive analysis shows that this scheme is efficient and practical, and can achieve better performance than the μTESLA system. Molecular Diversity Preservation International (MDPI) 2010-09-17 /pmc/articles/PMC3231227/ /pubmed/22163679 http://dx.doi.org/10.3390/s100908683 Text en © 2010 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
spellingShingle Article
Eldefrawy, Mohamed Hamdy
Khan, Muhammad Khurram
Alghathbar, Khaled
Cho, Eun-Suk
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
title Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
title_full Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
title_fullStr Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
title_full_unstemmed Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
title_short Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
title_sort broadcast authentication for wireless sensor networks using nested hashing and the chinese remainder theorem
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3231227/
https://www.ncbi.nlm.nih.gov/pubmed/22163679
http://dx.doi.org/10.3390/s100908683
work_keys_str_mv AT eldefrawymohamedhamdy broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem
AT khanmuhammadkhurram broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem
AT alghathbarkhaled broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem
AT choeunsuk broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem