Font Size: a A A

Research On Broadcast Authentication For Wireless Sensor Networks

Posted on:2017-04-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y GaoFull Text:PDF
GTID:2308330485469001Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the advances in sensor technologies in recent times, wireless sensor networks (WSNs) are increasingly popular in military, commercial, government, medical institu-tion, and so on. A WSN environment typically consists of a large number of resource-constrained sensor nodes and several control nodes (also known as base stations).To query a wireless sensor network, users (i.e. senders) need to send the query com-mands to all functional nodes. In order to reduce network bandwidth consumption and communication time, users usually broadcast to sensor nodes. Due to the existence of a large number of sensor nodes and the nature of wireless communication, broadcast com-munication plays an important role in WSNs. Therefore, the security of broadcast commu-nication has a direct impact on the security of the entire network. Broadcast packets use a one-way authentication, which requires an asymmetric mechanism to ensure its security; otherwise, any compromised receiver would leak the broadcast key of the network.In this paper, we mainly research on the core security issues in wireless sensor net-work the broadcast authentication technology. We combined the cryptography technology with the wireless sensor network tightly. Existing broadcast authentication schemes are mainly based on Message Authentication Codes (MACs) and Public Key Cryptography (PKC). The former has low energy consumption, and the latter can provide real-time au-thentication, each of them has advantages and disadvantages.In this paper, we consider the WSN application scenario of providing authentication for users. We put forward an efficient multi-sender broadcast authentication scheme and an improved online/offline identity-based broadcast authentication scheme.In the multi-sender broadcast authentication scheme, sensor nodes authenticate the initialization parameters of senders using the keys in the master key chain generated by the base station. The sender commutates with receivers using his own key chain. New senders are able to join in the network at any time during the whole communication. For the user compromised by an adversary, this paper provides a mechanism to revoke his broadcast authentication capability.For the design flaws in Kar’s scheme, this paper puts forward an improved online/offline identity-based signature scheme, and give a corresponding broadcast authentication scheme in WSN. In this paper, we prove that the scheme is secure against existential forgery on adaptively chosen message attack in random oracle model, under the assumption that CDHP is intractable. We also extended the basic scheme to provide the ability for a user to sign multiple messages.
Keywords/Search Tags:Wireless sensor network, broadcast authentication, μTESLA protocol, online/offline signature, identity-based signature
PDF Full Text Request
Related items