Advertisement

Springer Nature is making Coronavirus research free. View research | View latest news | Sign up for updates

DSBS: A Novel Dependable Secure Broadcast Stream over Lossy Channels

  • 117 Accesses

  • 4 Citations

Abstract

Confidential authenticated broadcast/multi cast over lossy channels is an important and challenging problem. Applications include the continuous confidential authentication of radio and TV internet broadcast/multicast data distribution by satellite and critical data broadcast in critical tasks (e.g. sensor network for military tasks). Main challenges are authenticity, confidentiality, loss-tolerance, efficiency. Asymmetric cryptography approaches have high security but are expensive in computation and communication. In this paper we propose and prototype a novel loss-tolerance mechanism for lossy channels ensuring authenticity, confidentiality, DoS resistance, efficiency and simplicity. Most applications in practice do not need ideal and perfect real-time task and a minor delay around some seconds is completely acceptable, except a few applications such as safety beacons in VANET. In many applications, such as updating code memory of MANET, delay around some minutes is acceptable, too. Hence, our aim is to provide a robust and dependable loss-tolerant secure broadcast stream at cost of delayed-verification. As an experimental implementation we prototype our proposal in a wireless sensor networks to show its efficiency.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

References

  1. 1.

    Karlsson, G., Lenders, V., & May, M. (2006). Delay-tolerant broadcasting. In Proceedings of the 2006 SIGCOMM workshop on Challenged networks (pp. 197–204). New York, NY, USA: ACM.

  2. 2.

    Lo, S.-C., Gao, J.-S., & Tseng, C.-C. (2013). A water-wave broadcast scheme for emergency messages in VANET. Wireless Personal Communications, 71(1), 217–241.

  3. 3.

    Perrig, A., Canetti, R., Tygar, J. D., & Song, D. X. (2000). Efficient authentication and signing of multicast streams over lossy channels. In IEEE symposium on security and privacy (pp. 56–73).

  4. 4.

    Perrig, A., Canetti, R., Song, D. X., & Tygar, J. D. (2001). Efficient and secure source authentication for multicast. In NDSS.

  5. 5.

    Perrig, A., Canetti, R., Tygar, J. D., & Song, D. (2005). The tesla broadcast authentication protocol. In Department of Engineering and Public Policy, paper 62, 2005, pp. 86–96.

  6. 6.

    Ali, S. T., Sivaraman, V., Dhamdhere, A., & Ostry, D. (2010). Secure key loss recovery for network broadcast in single-hop wireless sensor networks. Ad Hoc Networks, 8(6), 668–679.

  7. 7.

    Kwon, T., & Hong, J. (2010). Secure and efficient broadcast authentication in wireless sensor networks. IEEE Transactions on Computers, 59(8), 1120–1133.

  8. 8.

    Sivaraman, V., Ostry, D., Shaheen, J., Hianto, A. J., & Jha, S. (2011). Broadcast secrecy via key-chain-based encryption in single-hop wireless sensor networks. EURASIP Journal on Wireless Communications and Networking (vol. 2011).

  9. 9.

    Malan, D. J., Welsh, M., & Smith, M. D. (2004). A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In SECON (pp. 71–80).

  10. 10.

    Lee, J., Kapitanova, K., & Son, S. H. (2010). The price of security in wireless sensor networks. Computer Networks, 54(17), 2967–2978.

  11. 11.

    Karlof, C., Sastry, N., & Wagner, D. (2004). Tinysec: a link layer security architecture for wireless sensor networks. In SenSys (pp. 162–175).

  12. 12.

    Luk, M., Mezzour, G., Perrig, A., & Gligor, V. D. (2007). Minisec: a secure sensor network communication architecture. In IPSN, 2007 (pp. 479–488).

  13. 13.

    Tan, H., Ostry, D., Zic, J., & Jha, S. (2009). A confidential and dos-resistant multi-hop code dissemination protocol for wireless sensor networks. In WISEC, 2009 (pp. 245–252).

  14. 14.

    Srinivasan, A., & Wu, J. (2009). Secure and reliable broadcasting in wireless sensor networks using multi-parent trees. Security and Communication Networks, 2(3), 239–253.

  15. 15.

    Li, Q., & Trappe, W. (2005). Staggered tesla: a multicast authentication scheme resistant to dos attacks. In GLOBECOM, 2005 (p. 6).

  16. 16.

    Liu, D., & Ning, P. (2004). Multi-level tesla: Broadcast authentication for distributed sensor networks. ACM Transactions on Embedded Computing Systems, 3(4), 800–836.

  17. 17.

    Perrig, A., Szewczyk, R., Tygar, J., Wen, V., & Culler, D. (2002). Spins: security protocols for sensor networks. Wireless Networks, 8(5), 521–534.

  18. 18.

    Shaheen, J., Ostry, D., Sivaraman, V., & Jha, S. (2009). Confidential and secure broadcast in wireless sensor networks. In IEEE International Symposium for Personal, Indoor and Mobile Radio Communications, ser. PIMRC ’07, 2009.

  19. 19.

    Tan, H., Zic, J., Jha, S., & Ostry, D. (2011). Secure multi-hop network programming with multiple one-way key chains. IEEE Transactions on Mobile Computing, 10(1), 112–125.

  20. 20.

    Hui, J. W., & Culler, D. (2004). The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the 2nd international conference on Embedded networked sensor systems, ser. SenSys ’04 (pp. 81–94). New York, NY, USA: ACM.

  21. 21.

    Zhu, S., Setia, S., & Jajodia, S. (2003). Leap: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM conference on Computer and communications security, ser. CCS ’03 (pp. 62–72). New York, NY, USA: ACM, 2003. http://doi.acm.org/10.1145/948109.948120

  22. 22.

    Rogaway, P., Bellare, M., & Black, J. (2003). Ocb: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security, 6(3), 365–403.

  23. 23.

    Li, Q., & Rus, D. (2006). Global clock synchronization in sensor networks. IEEE Transactions on Computers, 55(2), 214–226.

  24. 24.

    Interplanetary internet project, internet society ipn special interest group. http://www.ipnsig.org.

  25. 25.

    Burleigh, S., Hooke, A., Torgerson, L., Fall, K., Cerf, V., Durst, B., et al. (2003). Delay-tolerant networking: An approach to interplanetary internet. Communications Magazine, IEEE, 41(6), 128–136.

  26. 26.

    Warthman, F. Delay-tolerant networks (dtns): A tutorial v1.1, Wartham Associates. http://www.dtnrg.org

  27. 27.

    Rivest, R. L. (1994). The rc5 encryption algorithm. In FSE (pp. 86–96).

  28. 28.

    Tmote sky, ultra low power ieee 802.15.4 compliant wirelesssensor module humidity, light, and temperature sensors with usb, Aug 2007. http://www.moteiv.com/products/docs/tmote-sky-data sheet.pdf.

  29. 29.

    Telosb-telosb mote platform. http://www.willow.co.uk/TelosB_Datasheet.pdf

  30. 30.

    Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In IPSN, 2008 (pp. 245–256).

  31. 31.

    Bouncy castle crypto apis, 2004. http://www.bouncycastle.org.

  32. 32.

    Shnayder, V., Hempstead, M., Chen B. R., Werner-Allen, G., & Welsh, M. (2004). Simulating the power consumption of large-scale sensor network applications. In SenSys, 2004 (pp. 188–200).

  33. 33.

    Ouni, S., & Ayoub, Z. (2013). Cooperative association/re-association approaches to optimize energy consumption for real-time IEEE 802.15.4/zigbee wireless sensor networks. Wireless Personal Communications, 71(4), 1–27.

Download references

Author information

Correspondence to Hassan Nasiraee.

Additional information

This is the full version of a paper by the same title presented at IST 6th IEEE Biannual International Conference for International Symposium on Telecommunications, IST, Tehran, Iran, November, 2012.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Nasiraee, H., Mohasefi, J.B. & Nasiraee, M. DSBS: A Novel Dependable Secure Broadcast Stream over Lossy Channels. Wireless Pers Commun 78, 599–613 (2014). https://doi.org/10.1007/s11277-014-1773-4

Download citation

Keywords

  • Security
  • Confidential secure broadcast
  • Lossy broadcast stream
  • Wireless sensor networks