Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem

eggplantcinnabarΚινητά – Ασύρματες Τεχνολογίες

21 Νοε 2013 (πριν από 3 χρόνια και 6 μήνες)

62 εμφανίσεις

Broadcast Authentication for Wireless Sensor Networks Using Nested
Hashing and the Chinese Remainder Theorem







more options



Author(s):

Eldefr
awy MH

(Eldefrawy, Mohamed Hamdy)
1
,

Khan MK

(Khan, Muhammad
Khurram)
1
,

Alghathbar K

(Alghathbar, Khaled)
1
,
2
,

Cho ES

(Cho, Eun
-
Suk)
3

Source:

SENSORS

Volume:

10

Issue:

9

Pages:

8683
-
8695

Published:

SEP 2010


Times Cited:

2

References:

16

Citation Map


Abstract:

Secure broadcasting is an essential feature for critical operations in wireless sensor network
(WSNs). However, due to the limited resources of sensor networ
ks, verifying the authenticity for
broadcasted messages is a very difficult issue. mu TESLA is a broadcast authentication protocol, which
uses network
-
wide loose time synchronization with one
-
way hashed keys to provide the authenticity
verification. Howeve
r, it suffers from several flaws considering the delay tolerance, and the chain length
restriction. In this paper, we propose a protocol which provides broadcast authentication for wireless
sensor networks. This protocol uses a nested hash chain of two dif
ferent hash functions and the
Chinese Remainder Theorem (CRT). The two different nested hash functions are employed for the seed
updating and the key generation. Each sensor node is challenged independently with a common
broadcasting message using the CRT.

Our algorithm provides forward and non
-
restricted key
generation, and in addition, no time synchronization is required. Furthermore, receivers can instantly
authenticate packets in real time. Moreover, the comprehensive analysis shows that this scheme is
efficient and practical, and can achieve better performance than the mu TESLA system.

Document Type:

Article

Language:

English

Author Keywords:

wireless sensor network; authenticated broadcast; nested hashing chains; Chinese
Remainder Theorem

Reprint A
ddress:

Khan, MK (reprint author), King Saud Univ, Ctr Excellence Informat Assurance
CoEIA, POB 92144, Riyadh 11653, Saudi Arabia

Addresses:


1. King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh 11653, Saudi Arabia


2. King Saud Univ, Coll C
omp & Informat Sci, Dept Informat Syst, Riyadh 11653, Saudi Arabia


3. Hannam Univ, Dept Multimedia, Taejon 306791, South Korea

E
-
mail
Addresses:

meldefrawy@ksu.edu.sa
,

mkhurram@ksu.edu.sa
,

kalghathbar@ksu.edu.sa
,

eunsukk@em
pal.com

Publisher:

MDPI AG, KANDERERSTRASSE 25, CH
-
4057 BASEL, SWITZERLAND

Subject Category:

Chemistry, Analyt
ical; Electrochemistry; Instruments & Instrumentation

IDS Number:

655BY

ISSN:

1424
-
8220

DOI:

10.3390/s100908683