Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A new signature scheme based on the DSA giving message recovery
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Wireless sensor networks for habitat monitoring
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
SPINS: security protocols for sensor networks
Wireless Networks
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Short Signatures from the Weil Pairing
Journal of Cryptology
Sensor Networks for Emergency Response: Challenges and Opportunities
IEEE Pervasive Computing
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
An efficient scheme for authenticating public keys in sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Practical Broadcast Authentication in Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
An efficient broadcast authentication scheme in wireless sensor networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
WICON '06 Proceedings of the 2nd annual international workshop on Wireless internet
An Efficient Scheme for User Authentication in Wireless Sensor Networks
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
On Broadcast Authentication in Wireless Sensor Networks
IEEE Transactions on Wireless Communications
IEEE Communications Magazine
Secure and resilient clock synchronization in wireless sensor networks
IEEE Journal on Selected Areas in Communications
Dual-verifiers DVS with message recovery for tolerant routing in wireless sensor networks
PAISI'11 Proceedings of the 6th Pacific Asia conference on Intelligence and security informatics
Performance analysis of multivariate cryptosystem schemes for wireless sensor network
Computers and Electrical Engineering
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Hi-index | 0.24 |
Multi-user broadcast authentication enables a large number of users to join in and broadcast messages to wireless sensor networks (WSN) dynamically and authentically. Public-key-based schemes have been proposed to provide such services; however, none of them achieve security, scalability and efficiency simultaneously. This paper presents IMBAS, an identity-based multi-user broadcast authentication scheme with strong security, sound scalability and efficiency for WSN. IMBAS divides broadcasts into two categories and employs different cryptographic primitives. Users' broadcasts are secured with vBNN-IBS, a novel pairing-free identity-based signature with reduced signature size, which is proposed in this paper to achieve security, scalability and efficiency; the sink's broadcast is secured with Schnorr signature with partial message recovery to further optimize the efficiency. Password-based user private key protection is also proposed to resist proactively the compromise attack. Theoretical analysis demonstrates that IMBAS provides strong security and sound scalability. Quantitative energy analysis shows that IMBAS reduces energy consumption by at least 41.5 percent compared with previous identity-based scheme.