Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses ne...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2010-09-01
|
Series: | Sensors |
Subjects: | |
Online Access: | http://www.mdpi.com/1424-8220/10/9/8683/ |
id |
doaj-13eedb76f6f44bb7bcc2822a82fc4d6d |
---|---|
record_format |
Article |
spelling |
doaj-13eedb76f6f44bb7bcc2822a82fc4d6d2020-11-25T02:18:56ZengMDPI AGSensors1424-82202010-09-011098683869510.3390/s100908683Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder TheoremEun-Suk ChoMohamed Hamdy EldefrawyMuhammad Khurram KhanKhaled AlghathbarSecure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verification. However, it suffers from several flaws considering the delay tolerance, and the chain length restriction. In this paper, we propose a protocol which provides broadcast authentication for wireless sensor networks. This protocol uses a nested hash chain of two different hash functions and the Chinese Remainder Theorem (CRT). The two different nested hash functions are employed for the seed updating and the key generation. Each sensor node is challenged independently with a common broadcasting message using the CRT. Our algorithm provides forward and non-restricted key generation, and in addition, no time synchronization is required. Furthermore, receivers can instantly authenticate packets in real time. Moreover, the comprehensive analysis shows that this scheme is efficient and practical, and can achieve better performance than the μTESLA system. http://www.mdpi.com/1424-8220/10/9/8683/wireless sensor networkauthenticated broadcastnested hashing chainsChinese Remainder Theorem |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Eun-Suk Cho Mohamed Hamdy Eldefrawy Muhammad Khurram Khan Khaled Alghathbar |
spellingShingle |
Eun-Suk Cho Mohamed Hamdy Eldefrawy Muhammad Khurram Khan Khaled Alghathbar Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem Sensors wireless sensor network authenticated broadcast nested hashing chains Chinese Remainder Theorem |
author_facet |
Eun-Suk Cho Mohamed Hamdy Eldefrawy Muhammad Khurram Khan Khaled Alghathbar |
author_sort |
Eun-Suk Cho |
title |
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem |
title_short |
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem |
title_full |
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem |
title_fullStr |
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem |
title_full_unstemmed |
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem |
title_sort |
broadcast authentication for wireless sensor networks using nested hashing and the chinese remainder theorem |
publisher |
MDPI AG |
series |
Sensors |
issn |
1424-8220 |
publishDate |
2010-09-01 |
description |
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verification. However, it suffers from several flaws considering the delay tolerance, and the chain length restriction. In this paper, we propose a protocol which provides broadcast authentication for wireless sensor networks. This protocol uses a nested hash chain of two different hash functions and the Chinese Remainder Theorem (CRT). The two different nested hash functions are employed for the seed updating and the key generation. Each sensor node is challenged independently with a common broadcasting message using the CRT. Our algorithm provides forward and non-restricted key generation, and in addition, no time synchronization is required. Furthermore, receivers can instantly authenticate packets in real time. Moreover, the comprehensive analysis shows that this scheme is efficient and practical, and can achieve better performance than the μTESLA system. |
topic |
wireless sensor network authenticated broadcast nested hashing chains Chinese Remainder Theorem |
url |
http://www.mdpi.com/1424-8220/10/9/8683/ |
work_keys_str_mv |
AT eunsukcho broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem AT mohamedhamdyeldefrawy broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem AT muhammadkhurramkhan broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem AT khaledalghathbar broadcastauthenticationforwirelesssensornetworksusingnestedhashingandthechineseremaindertheorem |
_version_ |
1724879747909943296 |