An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks

For network users roaming in a wireless sensor network (WSN), they can broadcast queries to WSNs to obtain the latest sensed data from sensor nodes using their mobile devices. In such a scenario, each sensor node has to verify the validity of every query sent from users. In this paper, RSA-like publ...

Full description

Bibliographic Details
Main Authors: Chen-Yang Cheng, Iuon-Chang Lin, Shu-Yan Huang
Format: Article
Language:English
Published: SAGE Publishing 2015-09-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2015/743623
id doaj-fbdfe572f0f5481c9728e7adfc1165a7
record_format Article
spelling doaj-fbdfe572f0f5481c9728e7adfc1165a72020-11-25T03:02:54ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772015-09-011110.1155/2015/743623743623An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor NetworksChen-Yang Cheng0Iuon-Chang Lin1Shu-Yan Huang2 Department of Industrial Engineering and Management, National Taipei University of Technology, Taipei 106, Taiwan Department of Photonics and Communication Engineering, Asia University, Taichung 413, Taiwan Department of Management Information Systems, National Chung Hsing University, Taichung 402, TaiwanFor network users roaming in a wireless sensor network (WSN), they can broadcast queries to WSNs to obtain the latest sensed data from sensor nodes using their mobile devices. In such a scenario, each sensor node has to verify the validity of every query sent from users. In this paper, RSA-like public key cryptography is employed to design a mechanism for multiuser broadcast authentication in WSNs. Within the proposed scheme, the use of certificates becomes optional. When users broadcast queries to WSNs, each sensor node can verify every query immediately without buffering any one. As a result, the energy cost for verifying a query by a sensor node is very small. Furthermore, our scheme provides enough scalability and security. The quantitative analyses show that our scheme is efficient in terms of storage and computational overheads.https://doi.org/10.1155/2015/743623
collection DOAJ
language English
format Article
sources DOAJ
author Chen-Yang Cheng
Iuon-Chang Lin
Shu-Yan Huang
spellingShingle Chen-Yang Cheng
Iuon-Chang Lin
Shu-Yan Huang
An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks
International Journal of Distributed Sensor Networks
author_facet Chen-Yang Cheng
Iuon-Chang Lin
Shu-Yan Huang
author_sort Chen-Yang Cheng
title An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks
title_short An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks
title_full An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks
title_fullStr An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks
title_full_unstemmed An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks
title_sort rsa-like scheme for multiuser broadcast authentication in wireless sensor networks
publisher SAGE Publishing
series International Journal of Distributed Sensor Networks
issn 1550-1477
publishDate 2015-09-01
description For network users roaming in a wireless sensor network (WSN), they can broadcast queries to WSNs to obtain the latest sensed data from sensor nodes using their mobile devices. In such a scenario, each sensor node has to verify the validity of every query sent from users. In this paper, RSA-like public key cryptography is employed to design a mechanism for multiuser broadcast authentication in WSNs. Within the proposed scheme, the use of certificates becomes optional. When users broadcast queries to WSNs, each sensor node can verify every query immediately without buffering any one. As a result, the energy cost for verifying a query by a sensor node is very small. Furthermore, our scheme provides enough scalability and security. The quantitative analyses show that our scheme is efficient in terms of storage and computational overheads.
url https://doi.org/10.1155/2015/743623
work_keys_str_mv AT chenyangcheng anrsalikeschemeformultiuserbroadcastauthenticationinwirelesssensornetworks
AT iuonchanglin anrsalikeschemeformultiuserbroadcastauthenticationinwirelesssensornetworks
AT shuyanhuang anrsalikeschemeformultiuserbroadcastauthenticationinwirelesssensornetworks
AT chenyangcheng rsalikeschemeformultiuserbroadcastauthenticationinwirelesssensornetworks
AT iuonchanglin rsalikeschemeformultiuserbroadcastauthenticationinwirelesssensornetworks
AT shuyanhuang rsalikeschemeformultiuserbroadcastauthenticationinwirelesssensornetworks
_version_ 1724687823292858368