Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem

Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses ne...

Full description

Bibliographic Details
Main Authors: Eun-Suk Cho, Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar
Format: Article
Language:English
Published: MDPI AG 2010-09-01
Series:Sensors
Subjects:
Online Access:http://www.mdpi.com/1424-8220/10/9/8683/
id doaj-13eedb76f6f44bb7bcc2822a82fc4d6d
record_format Article
spelling doaj-13eedb76f6f44bb7bcc2822a82fc4d6d2020-11-25T02:18:56ZengMDPI AGSensors1424-82202010-09-011098683869510.3390/s100908683Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder TheoremEun-Suk ChoMohamed Hamdy EldefrawyMuhammad Khurram KhanKhaled AlghathbarSecure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verification. However, it suffers from several flaws considering the delay tolerance, and the chain length restriction. In this paper, we propose a protocol which provides broadcast authentication for wireless sensor networks. This protocol uses a nested hash chain of two different hash functions and the Chinese Remainder Theorem (CRT). The two different nested hash functions are employed for the seed updating and the key generation. Each sensor node is challenged independently with a common broadcasting message using the CRT. Our algorithm provides forward and non-restricted key generation, and in addition, no time synchronization is required. Furthermore, receivers can instantly authenticate packets in real time. Moreover, the comprehensive analysis shows that this scheme is efficient and practical, and can achieve better performance than the μTESLA system. http://www.mdpi.com/1424-8220/10/9/8683/wireless sensor networkauthenticated broadcastnested hashing chainsChinese Remainder Theorem
collection DOAJ
language English
format Article
sources DOAJ
author Eun-Suk Cho
Mohamed Hamdy Eldefrawy
Muhammad Khurram Khan
Khaled Alghathbar
spellingShingle Eun-Suk Cho
Mohamed Hamdy Eldefrawy
Muhammad Khurram Khan
Khaled Alghathbar
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
Sensors
wireless sensor network
authenticated broadcast
nested hashing chains
Chinese Remainder Theorem
author_facet Eun-Suk Cho
Mohamed Hamdy Eldefrawy
Muhammad Khurram Khan
Khaled Alghathbar
author_sort Eun-Suk Cho
title Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
title_short Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
title_full Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
title_fullStr Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
title_full_unstemmed Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
title_sort broadcast authentication for wireless sensor networks using nested hashing and the chinese remainder theorem
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2010-09-01
description Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verification. However, it suffers from several flaws considering the delay tolerance, and the chain length restriction. In this paper, we propose a protocol which provides broadcast authentication for wireless sensor networks. This protocol uses a nested hash chain of two different hash functions and the Chinese Remainder Theorem (CRT). The two different nested hash functions are employed for the seed updating and the key generation. Each sensor node is challenged independently with a common broadcasting message using the CRT. Our algorithm provides forward and non-restricted key generation, and in addition, no time synchronization is required. Furthermore, receivers can instantly authenticate packets in real time. Moreover, the comprehensive analysis shows that this scheme is efficient and practical, and can achieve better performance than the μTESLA system.
topic wireless sensor network
authenticated broadcast
nested hashing chains
Chinese Remainder Theorem
url http://www.mdpi.com/1424-8220/10/9/8683/
work_keys_str_mv AT eunsukcho broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem
AT mohamedhamdyeldefrawy broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem
AT muhammadkhurramkhan broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem
AT khaledalghathbar broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem
_version_ 1724879747909943296