| Literature DB >> 22163679 |
Mohamed Hamdy Eldefrawy1, Muhammad Khurram Khan, Khaled Alghathbar, Eun-Suk Cho.
Abstract
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verification. However, it suffers from several flaws considering the delay tolerance, and the chain length restriction. In this paper, we propose a protocol which provides broadcast authentication for wireless sensor networks. This protocol uses a nested hash chain of two different hash functions and the Chinese Remainder Theorem (CRT). The two different nested hash functions are employed for the seed updating and the key generation. Each sensor node is challenged independently with a common broadcasting message using the CRT. Our algorithm provides forward and non-restricted key generation, and in addition, no time synchronization is required. Furthermore, receivers can instantly authenticate packets in real time. Moreover, the comprehensive analysis shows that this scheme is efficient and practical, and can achieve better performance than the μTESLA system.Entities:
Keywords: Chinese Remainder Theorem; authenticated broadcast; nested hashing chains; wireless sensor network
Mesh:
Year: 2010 PMID: 22163679 PMCID: PMC3231227 DOI: 10.3390/s100908683
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.Session key production considering a nested hash chain using two different hashes.
Execution times [μs] for two different hash algorithms, platforms and plaintext sizes [bytes].
| MD5 | 0 | 5,863 | 1,466 | 1,083 | 46 | 26 | 53 | 23 |
| 1:26 | 5,890 | 1,473 | 1,075 | 46 | 26 | 53 | 23 | |
| 62:80 | 10,888 | 2,722 | 2,011 | 74 | 45 | 90 | 39 | |
| SHA-1 | 1 | 15,249 | 3,812 | 2,651 | 69 | 51 | 102 | 27 |
| 3 | 15,781 | 3,945 | 5,303 | 69 | 50 | 103 | 27 | |
| 65 | 14543 | 3636 | 7955 | 133 | 102 | 205 | 55 | |
| 64 | 31,107 | 7,777 | 10,907 | 145 | 103 | 207 | 56 |
The Proposed Scheme Notation.
| Represents the first hash function | |
| Represents the second hash function | |
| ( | The nested hashing progress values for |
| Hashing the seed by | |
| Session key for the | |
| The encryption of the concatenated message with the session by the session key | |
| The podcasted packet for the | |
| The broadcasted chain indexes, calculated by the CRT | |
| The current seed | |
| The next seed |