Abstract
For inter-sensor broadcast authentication in wireless sensor networks, Chen et al. proposed a bootstrapping scheme which enables to save only neighboring nodes’ hash-chain commitments, much fewer than whole network size, before deployment [2]. However, the scheme lacks scalability and is not tolerant for node isolation. Therefore, we suggest new mechanism providing scalability and present its modified version with node-redemption which makes most of nodes participate in broadcast authentication with a little additional memory.
Chapter PDF
Similar content being viewed by others
References
Chang, S., Shieh, S., Lin, W., Hsieh, C.: An Efficient Broadcast Authentication Scheme in Wirless Sensor Networks. In: Proc. ASIACCS 2006, pp. 311–320 (March 2006)
Chen, W., Chen, Y.: A Bootstrapping Scheme for Inter-Sensor authentication within Sensor Networks. IEEE Communication Letters 9(10) (October 2005)
Chen, H., Perrig, A., Song, D.: Random key distribution schemes for sensor networks. In: Proc. IEEE Symposium on Security and Privacy, pp. 197–215 (May 2003)
Deng, J., Han, R., Mishra, S.: A performance evaluation of instrusion-tolerant routing in wireless sensor networks. In: Zhao, F., Guibas, L.J. (eds.) IPSN 2003. LNCS, vol. 2634, pp. 349–364. Springer, Heidelberg (2003)
Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proc. the 9th ACM conference on Computer and Communications security, pp. 41–47 (November 2002)
Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Hwang, J., Kim, Y.: Revisiting Random Key Pre-distribution for Sensor Networks. In: SASN 2004. ACM Workshop on Security of Ad Hoc and Sensor Networks, ACM Press, New York (2004)
Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In: Proc. Annual Network and Distributed System Security Symposium (NDSS), pp. 263–276 (February 2003)
Moon, H., Lee, S.: Efficient Broadcast Authentication in WSNs. Proc. of IEEK 43(TC-6), 683–689 (2006)
Perrig, A., Stankovic, J., Wagner, D.: Security In Wirless Sensor Networks. Communication of the ACM 47, 53–57 (2004)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8, 521–534 (2002)
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-Based Compromise-Tolerant Security Mechanism for Wirless Sensor Networks. IEEE Journal on Selected Areas in Communications 24(2) (February 2006)
Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanism for large-scale distributed sensor networks. In: IPSN. Proc. Symposium on Information Processing in Sensor Networks, pp. 259–268 (April 2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, J.W., Kim, Y.H., Lee, H., Lee, D.H. (2007). A Practical Inter-sensor Broadcast Authentication Scheme. In: Stephanidis, C. (eds) Universal Acess in Human Computer Interaction. Coping with Diversity. UAHCI 2007. Lecture Notes in Computer Science, vol 4554. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73279-2_44
Download citation
DOI: https://doi.org/10.1007/978-3-540-73279-2_44
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73278-5
Online ISBN: 978-3-540-73279-2
eBook Packages: Computer ScienceComputer Science (R0)