The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
SPINS: security protocols for sensor networks
Wireless Networks
How to Achieve a McEliece-Based Digital Signature Scheme
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Practical Broadcast Authentication in Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
An efficient broadcast authentication scheme in wireless sensor networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Localized Broadcast Authentication in Large Sensor Networks
ICNS '06 Proceedings of the International conference on Networking and Services
Seven cardinal properties of sensor network broadcast authentication
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Computer Communications
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Comparison of innovative signature algorithms for WSNs
WiSec '08 Proceedings of the first ACM conference on Wireless network security
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
On the application of pairing based cryptography to wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
IEICE - Transactions on Information and Systems
Communication Security in Wireless Sensor Networks
Communication Security in Wireless Sensor Networks
TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory
NCA '09 Proceedings of the 2009 Eighth IEEE International Symposium on Network Computing and Applications
Two-factor user authentication in wireless sensor networks
IEEE Transactions on Wireless Communications
Lightweight broadcast authentication protocols reconsidered
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Efficient implementation of public key cryptosystems on mote sensors (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
On Broadcast Authentication in Wireless Sensor Networks
IEEE Transactions on Wireless Communications
IEEE Communications Magazine
Performance analysis of multivariate cryptosystem schemes for wireless sensor network
Computers and Electrical Engineering
Hi-index | 0.00 |
In wireless sensor networks (WSNs), broadcast authentication is a crucial security mechanism that allows a multitude of legitimate users to join in and disseminate messages into the networks in a dynamic and authenticated way. During the past few years, several public-key based multi-user broadcast authentication schemes have been proposed to achieve immediate authentication and to address the security vulnerability intrinsic to @mTESLA-like schemes. Unfortunately, the relatively slow signature verification in signature-based broadcast authentication has also incurred a series of problems such as high energy consumption and long verification delay. In this contribution, we propose an efficient technique to accelerate the signature verification in WSNs through the cooperation among sensor nodes. By allowing some sensor nodes to release the intermediate computation results to their neighbors during the signature verification, a large number of sensor nodes can accelerate their signature verification process significantly. When applying our faster signature verification technique to the broadcast authentication in a 4x4 grid-based WSN, a quantitative performance analysis shows that our scheme needs 17.7-34.5% less energy and runs about 50% faster than the traditional signature verification method. The efficiency of the proposed technique has been tested through an experimental study on a network of MICAz motes.