Skip to main content

Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks

  • Conference paper
Ad Hoc Networks (ADHOCNETS 2010)

Abstract

In wireless sensor networks (WSNs), broadcast authentication is a crucial security mechanism that allows a multitude of legitimate users to join in and disseminate messages into the networks in a dynamic and authenticated way. During the past few years, several public-key based multi-user broadcast authentication schemes have been proposed to achieve immediate authentication and to address the security vulnerability intrinsic to μTESLA-like schemes. Unfortunately, the relatively slow signature verification in signature-based broadcast authentication has also incurred a series of problems such as high energy consumption and long verification delay. In this contribution, we propose an efficient technique to accelerate the signature verification in WSNs through the cooperation among sensor nodes. By allowing some sensor nodes to release the intermediate computation results to their neighbors during the signature verification, a large number of sensor nodes can accelerate their signature verification process significantly. When applying our faster signature verification technique to the broadcast authentication in a 4×4 grid-based WSN, a quantitative performance analysis shows that our scheme needs 17.7%~34.5% less energy and runs about 50% faster than the traditional signature verification method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, L., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine 40(8), 102–116 (2002)

    Article  Google Scholar 

  2. Bellare, M., Namprempre, C., Neven, G.: Security Proofs for Identity-Based Identification and Signature Schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268–286. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Chang, S., Shieh, S., Lin, W., Hsieh, C.-M.: An Efficient Broadcast Authentication Scheme. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), pp. 311–320 (2006)

    Google Scholar 

  4. Cao, X., Kou, W., Dang, L., Zhao, B.: IMBAS: Identity-Based Multi-User Broadcast Authentication in Wireless Sensor Networks. Computer Communications 31(4), 659–667 (2008)

    Article  Google Scholar 

  5. Courtois, N., Finiasz, M., Sendrier, N.: How to Achieve a McEliece-Based Digital Signature Scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 157–174. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Crossbow Technology Inc.: MICAz – Wireless Measurement System, http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/MICAz_Datasheet.pdf

  7. Dong, Q., Liu, D., Ning, P.: Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Wireless Sensor Networks. In: Proceedings of the First ACM Conference on Wireless Network Security (WiSec 2008), pp. 2–12 (2008)

    Google Scholar 

  8. Driessen, B., Poschmann, A., Paar, C.: Comparison of Innovative Signature Algorithms for WSNs. In: Proceedings of the First ACM Conference on Wireless Network Security (WiSec 2008), pp. 30–35 (2008)

    Google Scholar 

  9. Drissi, J., Gu, Q.: Localized Broadcast Authentication in Large Sensor Networks. In: Proceedings of the International Conference on Networking and Services (ICNS 2006), pp. 25–31 (2006)

    Google Scholar 

  10. Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), SPOTS Track, pp. 245–256 (2008)

    Google Scholar 

  11. Liu, D., Ning, P.: Multi-Level μTESLA: Broadcast Authentication for Distributed Sensor Networks. ACM Transactions on Embedded Computing Systems 3(4), 800–836 (2004)

    Article  MathSciNet  Google Scholar 

  12. Liu, D., Ning, P., Zhu, S., Jajodia, S.: Practical Broadcast Authentication in Sensor Networks. In: Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), pp. 118–129 (2005)

    Google Scholar 

  13. López, J., Aranha, D., Câmara, D., Dahab, R., Oliveira, L., Lopes, C.: Fast Implementation of Elliptic Curve Cryptography and Pairing Computation for Sensor Networks. In: The 13th Workshop on Elliptic Curve Cryptography (ECC 2009), http://ecc.math.ucalgary.ca/sites/ecc.math.ucalgary.ca/files/u5/Lopez_ECC2009.pdf

  14. Luk, M., Perrig, A., Whillock, B.: Seven Cardinal Properties of Sensor Network Broadcast Authentication. In: Proceedings of the Fourth ACM workshop on Security of Ad Hoc and Sensor Networks (SASN 2006), pp. 147–156 (2006)

    Google Scholar 

  15. Ning, P., Liu, A., Du, W.: Mitigate DOS Attacks Against Broadcast Authentication in Wireless Sensor Networks. ACM Transactions on Sensor Networks 4(1), 1:1–1:35 (2008)

    Article  Google Scholar 

  16. Perrig, A.: The BiBa One-Time Signature and Broadcast Authentication Protocol. In: Proceedings of the 8th ACM conference on Computer and Communications Security (CCS 2001), pp. 28–37 (2001)

    Google Scholar 

  17. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security Protocols for Sensor Networks. ACM Wireless Networks 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  18. Ren, K., Lou, W., Zeng, K., Moran, P.J.: On Broadcast Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications 6(11), 4136–4144 (2007)

    Article  Google Scholar 

  19. Ren, K., Yu, S., Lou, W., Zhang, Y.: Multi-user Broadcast Authentication in Wireless Sensor Networks. To appear in IEEE Transactions on Vehicular Technology (2009)

    Google Scholar 

  20. Seo, S.C., Han, D.-G., Song, S.: TinyECCK: Efficient Elliptic Curve Cryptography Implemenation over GF(2m) on 8-bit Micaz Mote. IEICE Transactions on Information and Systems E91-D(5), 1338–1347 (2008)

    Article  Google Scholar 

  21. Shirase, M., Miyazaki, Y., Takagi, T., Han, D.-G., Choi, D.: Efficient Implementation of Pairing Based Cryptography on a Sensor Node. IEICE Transactions on Information and Systems E92-D(5), 909–917 (2009)

    Article  Google Scholar 

  22. Szczechowiak, P., Kargl, A., Scott, M., Collier, M.: On the Application of Pairing Based Cryptography to Wireless Sensor Networks. In: Proceedings of the Second ACM Conference on Wireless Network Security (WiSec 2009), pp. 1–12 (2009)

    Google Scholar 

  23. Texas Instrument Inc. 2.4 GHz IEEE 802.15.4/ZigBee-ready RF Transceiver, http://focus.ti.com/lit/ds/symlink/cc2420.pdf

  24. Zhang, Q., Yu, T., Ning, P.: A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Transactions in Information and Systems Security (TISSEC) 11(3), 1–37 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Fan, X., Gong, G. (2010). Accelerating Signature-Based Broadcast Authentication for Wireless Sensor Networks. In: Zheng, J., Simplot-Ryl, D., Leung, V.C.M. (eds) Ad Hoc Networks. ADHOCNETS 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 49. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17994-5_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17994-5_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17993-8

  • Online ISBN: 978-3-642-17994-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics