Abstract
We present two broadcast authentication protocols based on delayed key disclosure. Our protocols rely on symmetric-key cryptographic primitives and use cryptographic puzzles to provide efficient broadcast authentication in different application scenarios, including those with resource-constrained wireless devices such as sensor nodes. The strong points of the protocols proposed are that one protocol allows instantaneous message origin authentication, whereas the other has low communication overhead. In addition to formalizing and analyzing these specific protocols, we carry out a general analysis of broadcast authentication protocols based on delayed key disclosure. This analysis uncovers fundamental limitations of this class of protocols in terms of the required accuracy of message propagation time estimations, if the protocols are to guarantee security and run efficiently.
The work presented in this paper was supported (in part) by the National Competence Center in Research on Mobile Information and Communication Systems (NCCR-MICS), a center supported by the Swiss National Science Foundation under grant number 5005-67322.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Berkovits, S.: How to broadcast a secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 535–541. Springer, Heidelberg (1991)
Boneh, D., Durfee, G., Franklin, M.: Lower bounds for multicast message authentication. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 437. Springer, Heidelberg (2001)
Canetti, R., Cheng, P.-C., Giraud, F., Pendarakis, D., Rao, J.R., Rohatgi, P.: An IPSec-based host architecture for secure internet multicast. In: Internet Society Symposium on Network and Distributed Systems Security (2000), citeseer.ist.psu.edu/canetti00ipsecbased.html
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: INFOCOMM’99 (1999)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (2003)
Chang, S.-M., Shieh, S., Lin, W.W., Hsieh, C.-M.: An efficient broadcast authentication scheme. In: ACM Symposium on Information, Computer and Communications Security, ACM Press, New York (2006), http://www.truststc.org/pubs/69.html
Chang, S.-M., Shieh, S., Lin, W.W., Hsieh, C.-M.: An efficient broadcast authentication scheme in wireless sensor networks. In: ASIACCS ’06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, Taipei, Taiwan, ACM Press, New York (2006)
Cheung, S.: An efficient message authentication scheme for link state routing. In: ACSAC (1997)
Merkle, R.C.: Secure communications over insecure channels. Communications of the ACM (1978)
Desmedt, Y., Frankel, Y., Yung, M.: Multi-receiver/multi-sender network security: efficient authenticated multicast/feedback. In: IEEE INFOCOM ’92: Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications, IEEE Computer Society Press, Los Alamitos (1992)
Du, W., Wang, R., Ning, P.: An efficient scheme for authenticating public keys in sensor networks. In: MobiHoc ’05: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, ACM Press, New York (2005)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS ’02: Proceedings of the 9th ACM conference on Computer and communications security, ACM Press, New York (2002)
Ganeriwal, S., Capkun, S., Han, C.-C., Srivastava, M.B.: Secure time synchronization service for sensor networks. In: WiSe ’05: Proceedings of the 4th ACM workshop on Wireless security, ACM Press, New York (2005)
Gennaro, R., Rohatgi, P.: How to sign digital streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)
Getting, I.: The Global Positioning System. IEEE Spectrum (Dec. 1993)
Hauser, R., Przygienda, A., Tsudik, G.: Reducing the cost of security in link state routing. In: Internet Society Symposium on Network and Distributed Systems Security (1997)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. In: MobiCom ’02: Proceedings of the 8th annual international conference on Mobile computing and networking (2002)
Juels, A., Brainard, J.: Client puzzles: A cryptographic countermeasure against connection depletion attacks. In: Proccedings of NDSS ’99, Network and Distributed Security Systems (1999)
Lamport, L.: Password authentication within insecure communication. Communications of the ACM (1981)
Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. Technical report, Raleigh, NC, USA (2002)
Liu, D., Ning, P.: Multilevel μ-tesla: Broadcast authentication for distributed sensor networks. Trans. on Embedded Computing Sys. 3(4) (2004)
Liu, D., Ning, P., Zhu, S., Jajodia, S.: Practical broadcast authentication in sensor networks. In: MOBIQUITOUS ’05: Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, Washington, DC, USA, pp. 118–132. IEEE Computer Society Press, Los Alamitos (2005)
Manzo, M., Roosta, T., Sastry, S.: Time synchronization attacks in sensor networks. In: SASN ’05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, ACM Press, New York (2005)
National Institute of Stanards and Technology. Announcing the advanced encryption standard (aes). Federal Information, Processing Standards Publication 197 (2001)
Perrig, A.: The biba one-time signature and broadcast authentication protocol. In: ACM Conference on Computer and Communications Security, pp. 28–37. ACM Press, New York (2001)
Perrig, A., Canetti, R., Tygar, D., Song, D.: The tesla broadcast authentication protocol. RSA Cryptobytes (2002)
Perrig, A., Tygar, D.: Secure Broadcast Communication in Wired and Wireless Networks. Kluwer Academic Publishers, Dordrecht (2003)
Rivest, R.L., Shamir, A., Adelman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Technical Report MIT/LCS/TM-82 (1977)
Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Time-lock puzzles and timed-release crypto. (MIT/LCS/TR-684), 21 (1996), citeseer.ist.psu.edu/rivest96timelock.html
Sun, K., Ning, P., Wang, C.: Secure and resilient clock synchronization in wireless sensor networks. IEEE Journal on Selected Areas in Communications (2006)
Čagalj, M., Čapkun, S., Rengaswamy, R., Tsigkogiannis, I., Srivastava, M., Hubaux, J.-P.: Integrity (I) codes: Message Integrity Protection and Authentication Over Insecure Channels. In: IEEE Symposium on Security and Privacy (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Schaller, P., Čapkun, S., Basin, D. (2007). BAP: Broadcast Authentication Using Cryptographic Puzzles. In: Katz, J., Yung, M. (eds) Applied Cryptography and Network Security. ACNS 2007. Lecture Notes in Computer Science, vol 4521. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72738-5_26
Download citation
DOI: https://doi.org/10.1007/978-3-540-72738-5_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72737-8
Online ISBN: 978-3-540-72738-5
eBook Packages: Computer ScienceComputer Science (R0)