SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Optimal Security Proofs for PSS and Other Signature Schemes
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Generating RSA Moduli with a Predetermined Portion
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Security considerations for IEEE 802.15.4 networks
Proceedings of the 3rd ACM workshop on Wireless security
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Practical Broadcast Authentication in Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
An efficient broadcast authentication scheme in wireless sensor networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
How public key cryptography influences wireless sensor node lifetime
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Special-Purpose Hardware in Cryptanalysis: The Case of 1,024-Bit RSA
IEEE Security and Privacy
Containing denial-of-service attacks in broadcast authentication in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Extending IP to Low-Power, Wireless Personal Area Networks
IEEE Internet Computing
The exact security of digital signatures-how to sign with RSA and Rabin
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
A kilobit special number field sieve factorization
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Enabling full-size public-key algorithms on 8-bit sensor nodes
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
RSA moduli with a predetermined portion: techniques and applications
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Efficient implementation of public key cryptosystems on mote sensors (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Scalable hardware for sparse systems of linear equations, with applications to integer factorization
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Hi-index | 0.00 |
Efficient broadcast authentication in wireless sensor networks has been a long-lasting hard problem, mainly due to the resource constraint on sensor nodes. Though extensive research has been done in past years, there seems to exist no satisfactory solution to date. In this paper we propose a practical approach to the problem using short-lived digital signatures, in which a base station makes use of a short RSA modulus of limited lifetime, say, RSA-512 with 20-min lifetime, for authenticated broadcast with Rabin signatures giving message recovery. For this, we present an efficient and robust protocol using a one-way key chain to periodically distribute short RSA moduli to all sensor nodes in an authentic and loss-tolerant way. We also provide conservative lifetime estimation for short RSA moduli based on the state-of-the art factoring experiments and apply a number of possible optimizations in algorithms and parameters. The proposed scheme overcomes most drawbacks of existing schemes such as μTESLA and one-time signatures and turns out to be very efficient and practical. It can also be extended to provide secure failover of base stations and authentication delegation to mobile users.