Skip to main content
Log in

DSBS: A Novel Dependable Secure Broadcast Stream over Lossy Channels

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Confidential authenticated broadcast/multi cast over lossy channels is an important and challenging problem. Applications include the continuous confidential authentication of radio and TV internet broadcast/multicast data distribution by satellite and critical data broadcast in critical tasks (e.g. sensor network for military tasks). Main challenges are authenticity, confidentiality, loss-tolerance, efficiency. Asymmetric cryptography approaches have high security but are expensive in computation and communication. In this paper we propose and prototype a novel loss-tolerance mechanism for lossy channels ensuring authenticity, confidentiality, DoS resistance, efficiency and simplicity. Most applications in practice do not need ideal and perfect real-time task and a minor delay around some seconds is completely acceptable, except a few applications such as safety beacons in VANET. In many applications, such as updating code memory of MANET, delay around some minutes is acceptable, too. Hence, our aim is to provide a robust and dependable loss-tolerant secure broadcast stream at cost of delayed-verification. As an experimental implementation we prototype our proposal in a wireless sensor networks to show its efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Karlsson, G., Lenders, V., & May, M. (2006). Delay-tolerant broadcasting. In Proceedings of the 2006 SIGCOMM workshop on Challenged networks (pp. 197–204). New York, NY, USA: ACM.

  2. Lo, S.-C., Gao, J.-S., & Tseng, C.-C. (2013). A water-wave broadcast scheme for emergency messages in VANET. Wireless Personal Communications, 71(1), 217–241.

    Google Scholar 

  3. Perrig, A., Canetti, R., Tygar, J. D., & Song, D. X. (2000). Efficient authentication and signing of multicast streams over lossy channels. In IEEE symposium on security and privacy (pp. 56–73).

  4. Perrig, A., Canetti, R., Song, D. X., & Tygar, J. D. (2001). Efficient and secure source authentication for multicast. In NDSS.

  5. Perrig, A., Canetti, R., Tygar, J. D., & Song, D. (2005). The tesla broadcast authentication protocol. In Department of Engineering and Public Policy, paper 62, 2005, pp. 86–96.

  6. Ali, S. T., Sivaraman, V., Dhamdhere, A., & Ostry, D. (2010). Secure key loss recovery for network broadcast in single-hop wireless sensor networks. Ad Hoc Networks, 8(6), 668–679.

    Article  Google Scholar 

  7. Kwon, T., & Hong, J. (2010). Secure and efficient broadcast authentication in wireless sensor networks. IEEE Transactions on Computers, 59(8), 1120–1133.

    Article  MathSciNet  Google Scholar 

  8. Sivaraman, V., Ostry, D., Shaheen, J., Hianto, A. J., & Jha, S. (2011). Broadcast secrecy via key-chain-based encryption in single-hop wireless sensor networks. EURASIP Journal on Wireless Communications and Networking (vol. 2011).

  9. Malan, D. J., Welsh, M., & Smith, M. D. (2004). A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In SECON (pp. 71–80).

  10. Lee, J., Kapitanova, K., & Son, S. H. (2010). The price of security in wireless sensor networks. Computer Networks, 54(17), 2967–2978.

    Article  Google Scholar 

  11. Karlof, C., Sastry, N., & Wagner, D. (2004). Tinysec: a link layer security architecture for wireless sensor networks. In SenSys (pp. 162–175).

  12. Luk, M., Mezzour, G., Perrig, A., & Gligor, V. D. (2007). Minisec: a secure sensor network communication architecture. In IPSN, 2007 (pp. 479–488).

  13. Tan, H., Ostry, D., Zic, J., & Jha, S. (2009). A confidential and dos-resistant multi-hop code dissemination protocol for wireless sensor networks. In WISEC, 2009 (pp. 245–252).

  14. Srinivasan, A., & Wu, J. (2009). Secure and reliable broadcasting in wireless sensor networks using multi-parent trees. Security and Communication Networks, 2(3), 239–253.

    Google Scholar 

  15. Li, Q., & Trappe, W. (2005). Staggered tesla: a multicast authentication scheme resistant to dos attacks. In GLOBECOM, 2005 (p. 6).

  16. Liu, D., & Ning, P. (2004). Multi-level tesla: Broadcast authentication for distributed sensor networks. ACM Transactions on Embedded Computing Systems, 3(4), 800–836.

    Article  MathSciNet  Google Scholar 

  17. Perrig, A., Szewczyk, R., Tygar, J., Wen, V., & Culler, D. (2002). Spins: security protocols for sensor networks. Wireless Networks, 8(5), 521–534.

    Article  MATH  Google Scholar 

  18. Shaheen, J., Ostry, D., Sivaraman, V., & Jha, S. (2009). Confidential and secure broadcast in wireless sensor networks. In IEEE International Symposium for Personal, Indoor and Mobile Radio Communications, ser. PIMRC ’07, 2009.

  19. Tan, H., Zic, J., Jha, S., & Ostry, D. (2011). Secure multi-hop network programming with multiple one-way key chains. IEEE Transactions on Mobile Computing, 10(1), 112–125.

    Google Scholar 

  20. Hui, J. W., & Culler, D. (2004). The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the 2nd international conference on Embedded networked sensor systems, ser. SenSys ’04 (pp. 81–94). New York, NY, USA: ACM.

  21. Zhu, S., Setia, S., & Jajodia, S. (2003). Leap: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM conference on Computer and communications security, ser. CCS ’03 (pp. 62–72). New York, NY, USA: ACM, 2003. http://doi.acm.org/10.1145/948109.948120

  22. Rogaway, P., Bellare, M., & Black, J. (2003). Ocb: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security, 6(3), 365–403.

    Article  Google Scholar 

  23. Li, Q., & Rus, D. (2006). Global clock synchronization in sensor networks. IEEE Transactions on Computers, 55(2), 214–226.

    Article  Google Scholar 

  24. Interplanetary internet project, internet society ipn special interest group. http://www.ipnsig.org.

  25. Burleigh, S., Hooke, A., Torgerson, L., Fall, K., Cerf, V., Durst, B., et al. (2003). Delay-tolerant networking: An approach to interplanetary internet. Communications Magazine, IEEE, 41(6), 128–136.

    Article  Google Scholar 

  26. Warthman, F. Delay-tolerant networks (dtns): A tutorial v1.1, Wartham Associates. http://www.dtnrg.org

  27. Rivest, R. L. (1994). The rc5 encryption algorithm. In FSE (pp. 86–96).

  28. Tmote sky, ultra low power ieee 802.15.4 compliant wirelesssensor module humidity, light, and temperature sensors with usb, Aug 2007. http://www.moteiv.com/products/docs/tmote-sky-data sheet.pdf.

  29. Telosb-telosb mote platform. http://www.willow.co.uk/TelosB_Datasheet.pdf

  30. Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In IPSN, 2008 (pp. 245–256).

  31. Bouncy castle crypto apis, 2004. http://www.bouncycastle.org.

  32. Shnayder, V., Hempstead, M., Chen B. R., Werner-Allen, G., & Welsh, M. (2004). Simulating the power consumption of large-scale sensor network applications. In SenSys, 2004 (pp. 188–200).

  33. Ouni, S., & Ayoub, Z. (2013). Cooperative association/re-association approaches to optimize energy consumption for real-time IEEE 802.15.4/zigbee wireless sensor networks. Wireless Personal Communications, 71(4), 1–27.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hassan Nasiraee.

Additional information

This is the full version of a paper by the same title presented at IST 6th IEEE Biannual International Conference for International Symposium on Telecommunications, IST, Tehran, Iran, November, 2012.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nasiraee, H., Mohasefi, J.B. & Nasiraee, M. DSBS: A Novel Dependable Secure Broadcast Stream over Lossy Channels. Wireless Pers Commun 78, 599–613 (2014). https://doi.org/10.1007/s11277-014-1773-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-1773-4

Keywords

Navigation