An Improved CRT-based Broadcast Authentication Scheme in WSNs

As wireless sensor networks (WSNs) are increasingly widespread, probability of being under attack also will soar, so the security of WSNs has raised more concern. Broadcast communication plays an important role in WSNs due to the existence of a large numb

  • PDF / 291,413 Bytes
  • 8 Pages / 439.37 x 666.142 pts Page_size
  • 90 Downloads / 206 Views

DOWNLOAD

REPORT


Abstract As wireless sensor networks (WSNs) are increasingly widespread, probability of being under attack also will soar, so the security of WSNs has raised more concern. Broadcast communication plays an important role in WSNs due to the existence of a large number of sensor nodes and the broadcast nature of wireless communications. Therefore, the security of broadcast communication directly relates the safety of the entire network. Authentication is one of the basic security services needed to construct a practical WSNs. In this paper, we present a high-security broadcast authentication protocol. Our proposal combines time synchronization with the Chinese Remainder Theorem (CRT) to implement dual authentication. As a result, this scheme has greatly improvement to some existed schemes in term of security. Keywords Wireless sensor Chinese remainder theorem

networks



Broadcast

authentication



1 Introduction Wireless sensor networks (WSNs) are composed of a large number of tiny nodes which resources, communication ability and computing power are extremely limited [1]. In recent years, it has been widely applied to battlefield management, medical monitoring, environmental monitoring and so on. Broadcast communication plays an important role in WSNs due to the existence of a large number of Y. Zhu (&)  Y. Shen East China Normal University, Shanghai, China e-mail: [email protected]

S.-S. Yeo et al. (eds.), Computer Science and its Applications, Lecture Notes in Electrical Engineering 203, DOI: 10.1007/978-94-007-5699-1_49,  Springer Science+Business Media Dordrecht 2012

485

486

Y. Zhu and Y. Shen

sensor nodes and the broadcast nature of wireless communications. Therefore, the security of broadcast communication directly relates the safety of the entire network, especially nodes being deployed in the harsh conditions and lack of supervision. In order to ensure the security of WSNs, many security mechanisms are proposed, and broadcast authentication mechanism is one fundamental and essential of them. It can save WSN bandwidth and reduce the communication delays. In a broadcast authentication mechanism, the base station generally broadcasts the network nodes commands or sends data packets. When receiving the broadcast data from the base station, nodes need verify the authenticity of source, integrity, freshness of the packet. Due to the limited computing power of the sensor nodes, broadcast authentication mechanism generally does not use public key digital signature technology, instead of using symmetric scheme with time synchronization and hash function. TESLA is a remarkable mature scheme using broadcast authentication mechanism in sensor network [2, 3]. lTESLA [1], proposed by Perrig and Szewczyketc, is based on TESLA protocol. It introduces asymmetry by delaying the disclosure of symmetric keys which generates through one way hash chain. Liu and Ning have proposed Mulit-level lTESLA [4, 5] reduced overheads of key chain commitment distribution. However, these cannot immediately authenticate these messag