6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing

Research Article

Fast response PKC-based broadcast authentication in wireless sensor networks

Download787 downloads
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2010.55,
        author={Panoat Chuchaisri and Richard Newman},
        title={Fast response PKC-based broadcast authentication in wireless sensor networks},
        proceedings={6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing},
        publisher={IEEE},
        proceedings_a={COLLABORATECOM},
        year={2011},
        month={5},
        keywords={Authentication Delay Focusing Wireless communication Wireless sensor networks},
        doi={10.4108/icst.collaboratecom.2010.55}
    }
    
  • Panoat Chuchaisri
    Richard Newman
    Year: 2011
    Fast response PKC-based broadcast authentication in wireless sensor networks
    COLLABORATECOM
    ICST
    DOI: 10.4108/icst.collaboratecom.2010.55
Panoat Chuchaisri1,*, Richard Newman1,*
  • 1: Department of Computer and Information Science and Engineering, University of Florida, Gainseville, Florida 32611-6120
*Contact email: pchuchai@cise.ufl.edu, nemo@cise.ufl.edu

Abstract

Due to simpler protocol operations, e.g. no synchronization and higher tolerance to node capture attack compared to symmetric key-based approaches, public key-based (PKC) approaches have gained popularity in wireless sensor network (WSN) broadcast authentication. With PKC's security strength, a sensor node that authenticates messages before forwarding them can detect a bogus message within the first hop. While this prevents forged traffic from wasting the sensor nodes' energy, performing PKC operations in the computing-power-limited sensor node can result in undesirably long message propagation time. At the other extreme, the sensor node can forward the messages to other nodes prior to authenticating them. This approach diminishes propagation time with the trade-off of allowing forged messages to propagate through the network. To achieve swift and energy efficient broadcast operation, sensor nodes need to decide wisely when to forward first and when to authenticate first. In this paper, we present two new broadcast authentication schemes, called the key pool scheme and the key chain scheme, to solve this dilemma without any synchronization or periodic key redistribution. Both schemes utilize a Bloom filter and distribution of secret keys among sensor nodes to create fast and capture-resistant PKC-based broadcast authentication protocols. Our NS-2 simulation results confirm that our protocols' broadcast delay is only 50% slower than the forwarding-first scheme and ten times faster than the authentication-first scheme for a 3,000-node WSN. The key pool scheme also contains forged message propagation to the minimum even when the majority of nodes have been captured by the attacker.