Abstract
In wireless sensor networks (WSNs), broadcast authentication is a crucial security mechanism that allows a multitude of legitimate users to join in and disseminate messages into the networks in a dynamic and authenticated way. During the past few years, several public-key based multi-user broadcast authentication schemes have been proposed to achieve immediate authentication and to address the security vulnerability intrinsic to μTESLA-like schemes. Unfortunately, the relatively slow signature verification in signature-based broadcast authentication has also incurred a series of problems such as high energy consumption and long verification delay. In this contribution, we propose an efficient technique to accelerate the signature verification in WSNs through the cooperation among sensor nodes. By allowing some sensor nodes to release the intermediate computation results to their neighbors during the signature verification, a large number of sensor nodes can accelerate their signature verification process significantly. When applying our faster signature verification technique to the broadcast authentication in a 4×4 grid-based WSN, a quantitative performance analysis shows that our scheme needs 17.7%~34.5% less energy and runs about 50% faster than the traditional signature verification method.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Akyildiz, L., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine 40(8), 102–116 (2002)
Bellare, M., Namprempre, C., Neven, G.: Security Proofs for Identity-Based Identification and Signature Schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268–286. Springer, Heidelberg (2004)
Chang, S., Shieh, S., Lin, W., Hsieh, C.-M.: An Efficient Broadcast Authentication Scheme. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), pp. 311–320 (2006)
Cao, X., Kou, W., Dang, L., Zhao, B.: IMBAS: Identity-Based Multi-User Broadcast Authentication in Wireless Sensor Networks. Computer Communications 31(4), 659–667 (2008)
Courtois, N., Finiasz, M., Sendrier, N.: How to Achieve a McEliece-Based Digital Signature Scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 157–174. Springer, Heidelberg (2001)
Crossbow Technology Inc.: MICAz – Wireless Measurement System, http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/MICAz_Datasheet.pdf
Dong, Q., Liu, D., Ning, P.: Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Wireless Sensor Networks. In: Proceedings of the First ACM Conference on Wireless Network Security (WiSec 2008), pp. 2–12 (2008)
Driessen, B., Poschmann, A., Paar, C.: Comparison of Innovative Signature Algorithms for WSNs. In: Proceedings of the First ACM Conference on Wireless Network Security (WiSec 2008), pp. 30–35 (2008)
Drissi, J., Gu, Q.: Localized Broadcast Authentication in Large Sensor Networks. In: Proceedings of the International Conference on Networking and Services (ICNS 2006), pp. 25–31 (2006)
Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), SPOTS Track, pp. 245–256 (2008)
Liu, D., Ning, P.: Multi-Level μTESLA: Broadcast Authentication for Distributed Sensor Networks. ACM Transactions on Embedded Computing Systems 3(4), 800–836 (2004)
Liu, D., Ning, P., Zhu, S., Jajodia, S.: Practical Broadcast Authentication in Sensor Networks. In: Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), pp. 118–129 (2005)
López, J., Aranha, D., Câmara, D., Dahab, R., Oliveira, L., Lopes, C.: Fast Implementation of Elliptic Curve Cryptography and Pairing Computation for Sensor Networks. In: The 13th Workshop on Elliptic Curve Cryptography (ECC 2009), http://ecc.math.ucalgary.ca/sites/ecc.math.ucalgary.ca/files/u5/Lopez_ECC2009.pdf
Luk, M., Perrig, A., Whillock, B.: Seven Cardinal Properties of Sensor Network Broadcast Authentication. In: Proceedings of the Fourth ACM workshop on Security of Ad Hoc and Sensor Networks (SASN 2006), pp. 147–156 (2006)
Ning, P., Liu, A., Du, W.: Mitigate DOS Attacks Against Broadcast Authentication in Wireless Sensor Networks. ACM Transactions on Sensor Networks 4(1), 1:1–1:35 (2008)
Perrig, A.: The BiBa One-Time Signature and Broadcast Authentication Protocol. In: Proceedings of the 8th ACM conference on Computer and Communications Security (CCS 2001), pp. 28–37 (2001)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security Protocols for Sensor Networks. ACM Wireless Networks 8(5), 521–534 (2002)
Ren, K., Lou, W., Zeng, K., Moran, P.J.: On Broadcast Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications 6(11), 4136–4144 (2007)
Ren, K., Yu, S., Lou, W., Zhang, Y.: Multi-user Broadcast Authentication in Wireless Sensor Networks. To appear in IEEE Transactions on Vehicular Technology (2009)
Seo, S.C., Han, D.-G., Song, S.: TinyECCK: Efficient Elliptic Curve Cryptography Implemenation over GF(2m) on 8-bit Micaz Mote. IEICE Transactions on Information and Systems E91-D(5), 1338–1347 (2008)
Shirase, M., Miyazaki, Y., Takagi, T., Han, D.-G., Choi, D.: Efficient Implementation of Pairing Based Cryptography on a Sensor Node. IEICE Transactions on Information and Systems E92-D(5), 909–917 (2009)
Szczechowiak, P., Kargl, A., Scott, M., Collier, M.: On the Application of Pairing Based Cryptography to Wireless Sensor Networks. In: Proceedings of the Second ACM Conference on Wireless Network Security (WiSec 2009), pp. 1–12 (2009)
Texas Instrument Inc. 2.4 GHz IEEE 802.15.4/ZigBee-ready RF Transceiver, http://focus.ti.com/lit/ds/symlink/cc2420.pdf
Zhang, Q., Yu, T., Ning, P.: A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Transactions in Information and Systems Security (TISSEC) 11(3), 1–37 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Fan, X., Gong, G. (2010). Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks. In: Zheng, J., Simplot-Ryl, D., Leung, V.C.M. (eds) Ad Hoc Networks. ADHOCNETS 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 49. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17994-5_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-17994-5_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17993-8
Online ISBN: 978-3-642-17994-5
eBook Packages: Computer ScienceComputer Science (R0)