A symmetric key based secured data gathering protocol for WSN
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Enhancing broadcast authentication in sensor networks
SpringSim '10 Proceedings of the 2010 Spring Simulation Multiconference
Enhancing broadcast authentication in sensor networks
Proceedings of the 14th Communications and Networking Symposium
Hi-index | 0.00 |
This paper addresses secure broadcast in wireless sensor networks (WSN). We introduce new set of security protocols for broadcast operation, providing enhancements over the current set of security protocols. We introduce two protocols as an enhancement for ìTESLA protocol. In these protocols we focuses on reducing the memory requirements for the broadcast session while maintain the same security level. The first protocol, Low Buffer ìTESLA (LB- ìTESLA), achieves 88% reduction in the node buffer size comparing to the original ìTESLA protocol. The second protocol, Reversed MAC ìTESLA (RM- ìTESLA), achieves 92% reduction in the node buffer size comparing to the original ìTESLA protocol. This reduction enables longer session's duration and reduces the memory requirement.