Abstract
Confidential authenticated broadcast/multi cast over lossy channels is an important and challenging problem. Applications include the continuous confidential authentication of radio and TV internet broadcast/multicast data distribution by satellite and critical data broadcast in critical tasks (e.g. sensor network for military tasks). Main challenges are authenticity, confidentiality, loss-tolerance, efficiency. Asymmetric cryptography approaches have high security but are expensive in computation and communication. In this paper we propose and prototype a novel loss-tolerance mechanism for lossy channels ensuring authenticity, confidentiality, DoS resistance, efficiency and simplicity. Most applications in practice do not need ideal and perfect real-time task and a minor delay around some seconds is completely acceptable, except a few applications such as safety beacons in VANET. In many applications, such as updating code memory of MANET, delay around some minutes is acceptable, too. Hence, our aim is to provide a robust and dependable loss-tolerant secure broadcast stream at cost of delayed-verification. As an experimental implementation we prototype our proposal in a wireless sensor networks to show its efficiency.
Similar content being viewed by others
References
Karlsson, G., Lenders, V., & May, M. (2006). Delay-tolerant broadcasting. In Proceedings of the 2006 SIGCOMM workshop on Challenged networks (pp. 197–204). New York, NY, USA: ACM.
Lo, S.-C., Gao, J.-S., & Tseng, C.-C. (2013). A water-wave broadcast scheme for emergency messages in VANET. Wireless Personal Communications, 71(1), 217–241.
Perrig, A., Canetti, R., Tygar, J. D., & Song, D. X. (2000). Efficient authentication and signing of multicast streams over lossy channels. In IEEE symposium on security and privacy (pp. 56–73).
Perrig, A., Canetti, R., Song, D. X., & Tygar, J. D. (2001). Efficient and secure source authentication for multicast. In NDSS.
Perrig, A., Canetti, R., Tygar, J. D., & Song, D. (2005). The tesla broadcast authentication protocol. In Department of Engineering and Public Policy, paper 62, 2005, pp. 86–96.
Ali, S. T., Sivaraman, V., Dhamdhere, A., & Ostry, D. (2010). Secure key loss recovery for network broadcast in single-hop wireless sensor networks. Ad Hoc Networks, 8(6), 668–679.
Kwon, T., & Hong, J. (2010). Secure and efficient broadcast authentication in wireless sensor networks. IEEE Transactions on Computers, 59(8), 1120–1133.
Sivaraman, V., Ostry, D., Shaheen, J., Hianto, A. J., & Jha, S. (2011). Broadcast secrecy via key-chain-based encryption in single-hop wireless sensor networks. EURASIP Journal on Wireless Communications and Networking (vol. 2011).
Malan, D. J., Welsh, M., & Smith, M. D. (2004). A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In SECON (pp. 71–80).
Lee, J., Kapitanova, K., & Son, S. H. (2010). The price of security in wireless sensor networks. Computer Networks, 54(17), 2967–2978.
Karlof, C., Sastry, N., & Wagner, D. (2004). Tinysec: a link layer security architecture for wireless sensor networks. In SenSys (pp. 162–175).
Luk, M., Mezzour, G., Perrig, A., & Gligor, V. D. (2007). Minisec: a secure sensor network communication architecture. In IPSN, 2007 (pp. 479–488).
Tan, H., Ostry, D., Zic, J., & Jha, S. (2009). A confidential and dos-resistant multi-hop code dissemination protocol for wireless sensor networks. In WISEC, 2009 (pp. 245–252).
Srinivasan, A., & Wu, J. (2009). Secure and reliable broadcasting in wireless sensor networks using multi-parent trees. Security and Communication Networks, 2(3), 239–253.
Li, Q., & Trappe, W. (2005). Staggered tesla: a multicast authentication scheme resistant to dos attacks. In GLOBECOM, 2005 (p. 6).
Liu, D., & Ning, P. (2004). Multi-level tesla: Broadcast authentication for distributed sensor networks. ACM Transactions on Embedded Computing Systems, 3(4), 800–836.
Perrig, A., Szewczyk, R., Tygar, J., Wen, V., & Culler, D. (2002). Spins: security protocols for sensor networks. Wireless Networks, 8(5), 521–534.
Shaheen, J., Ostry, D., Sivaraman, V., & Jha, S. (2009). Confidential and secure broadcast in wireless sensor networks. In IEEE International Symposium for Personal, Indoor and Mobile Radio Communications, ser. PIMRC ’07, 2009.
Tan, H., Zic, J., Jha, S., & Ostry, D. (2011). Secure multi-hop network programming with multiple one-way key chains. IEEE Transactions on Mobile Computing, 10(1), 112–125.
Hui, J. W., & Culler, D. (2004). The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the 2nd international conference on Embedded networked sensor systems, ser. SenSys ’04 (pp. 81–94). New York, NY, USA: ACM.
Zhu, S., Setia, S., & Jajodia, S. (2003). Leap: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM conference on Computer and communications security, ser. CCS ’03 (pp. 62–72). New York, NY, USA: ACM, 2003. http://doi.acm.org/10.1145/948109.948120
Rogaway, P., Bellare, M., & Black, J. (2003). Ocb: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security, 6(3), 365–403.
Li, Q., & Rus, D. (2006). Global clock synchronization in sensor networks. IEEE Transactions on Computers, 55(2), 214–226.
Interplanetary internet project, internet society ipn special interest group. http://www.ipnsig.org.
Burleigh, S., Hooke, A., Torgerson, L., Fall, K., Cerf, V., Durst, B., et al. (2003). Delay-tolerant networking: An approach to interplanetary internet. Communications Magazine, IEEE, 41(6), 128–136.
Warthman, F. Delay-tolerant networks (dtns): A tutorial v1.1, Wartham Associates. http://www.dtnrg.org
Rivest, R. L. (1994). The rc5 encryption algorithm. In FSE (pp. 86–96).
Tmote sky, ultra low power ieee 802.15.4 compliant wirelesssensor module humidity, light, and temperature sensors with usb, Aug 2007. http://www.moteiv.com/products/docs/tmote-sky-data sheet.pdf.
Telosb-telosb mote platform. http://www.willow.co.uk/TelosB_Datasheet.pdf
Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In IPSN, 2008 (pp. 245–256).
Bouncy castle crypto apis, 2004. http://www.bouncycastle.org.
Shnayder, V., Hempstead, M., Chen B. R., Werner-Allen, G., & Welsh, M. (2004). Simulating the power consumption of large-scale sensor network applications. In SenSys, 2004 (pp. 188–200).
Ouni, S., & Ayoub, Z. (2013). Cooperative association/re-association approaches to optimize energy consumption for real-time IEEE 802.15.4/zigbee wireless sensor networks. Wireless Personal Communications, 71(4), 1–27.
Author information
Authors and Affiliations
Corresponding author
Additional information
This is the full version of a paper by the same title presented at IST 6th IEEE Biannual International Conference for International Symposium on Telecommunications, IST, Tehran, Iran, November, 2012.
Rights and permissions
About this article
Cite this article
Nasiraee, H., Mohasefi, J.B. & Nasiraee, M. DSBS: A Novel Dependable Secure Broadcast Stream over Lossy Channels. Wireless Pers Commun 78, 599–613 (2014). https://doi.org/10.1007/s11277-014-1773-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-014-1773-4