Seven cardinal properties of sensor network broadcast authentication
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Computer Communications
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
BAP: Broadcast Authentication Using Cryptographic Puzzles
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
Efficient security primitives derived from a secure aggregation algorithm
Proceedings of the 15th ACM conference on Computer and communications security
Collaborative authentication in unattended WSNs
Proceedings of the second ACM conference on Wireless network security
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs
Information Security Applications
Combining prediction hashing and MDS codes for efficient multicast stream authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Enhancing broadcast authentication in sensor networks
SpringSim '10 Proceedings of the 2010 Spring Simulation Multiconference
Intrusion-resilient integrity in data-centric unattended WSNs
Pervasive and Mobile Computing
Enhancing broadcast authentication in sensor networks
Proceedings of the 14th Communications and Networking Symposium
On broadcast authentication in wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Message and its origin authentication protocol for data aggregation in sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A survey of Intrusion Detection Systems for Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
Containing bogus packet insertion attacks for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Secret key revocation in sensor networks
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Hi-index | 0.00 |
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide such services for sensor networks. However, none of these techniques are scalable in terms of the number of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers), they either use substantial bandwidth and storage at sensor nodes, or require significant resources at senders to deal with DOS attacks. This paper presents ef?cient techniques to support a potentially large number of broadcast senders using µTESLA instances as building blocks. The proposed techniques are immune to the DOS attacks. This paper also provides two approaches, a revocation tree based scheme and a proactive distribution based scheme, to revoke the broadcast authentication capability from compromised senders. The proposed techniques are implemented, and evaluated through simulation on TinyOS. The analysis and experiment show that these techniques are ef?cient and practical, and can achieve better performance than the previous approaches.