Advertisement

Public Key-Based Lightweight Swarm Authentication

  • Simon Cogliani
  • Bao Feng
  • Houda Ferradi
  • Rémi Géraud
  • Diana Maimuţ
  • David Naccache
  • Rodrigo Portella do Canto
  • Guilin Wang
Chapter

Abstract

We describe a lightweight algorithm performing whole-network authentication in a distributed way. This protocol is more efficient than one-to-one node authentication: it results in less communication, less computation and overall lower energy consumption. The proposed algorithm is provably secure and achieves zero-knowledge authentication of a network in a time logarithmic in the number of nodes.

References

  1. 1.
    D. Anshul, S. Roy, A ZKP-based identification scheme for base nodes in wireless sensor networks, in Proceedings of the 2005 ACM Symposium on Applied Computing, SAC ’05 (ACM, New York, 2005), pp. 319–323Google Scholar
  2. 2.
    D. Boneh, C. Gentry, B. Lynn, H. Shacham, Aggregate and verifiably encrypted signatures from bilinear maps, in Advances in Cryptology – EUROCRYPT 2003, ed. by E. Biham. Lecture Notes in Computer Science, vol. 2656 (Springer, Heidelberg, 2003), pp. 416–432Google Scholar
  3. 3.
    T.H. Cormen, C. Stein, R.L. Rivest, C.E. Leiserson, Introduction to Algorithms, 2nd edn. (McGraw-Hill Higher Education, New York, 2001)zbMATHGoogle Scholar
  4. 4.
    U. Feige, A. Fiat, A. Shamir, Zero-knowledge proofs of identity. J. Cryptol. 1(2), 77–94 (1988)MathSciNetCrossRefGoogle Scholar
  5. 5.
    A. Fiat, A. Shamir, How to prove yourself: practical solutions to identification and signature problems, in Advances in Cryptology – CRYPTO’86, ed. by A.M. Odlyzko. Lecture Notes in Computer Science, vol. 263 (Springer, Heidelberg, 1987), pp. 186–194Google Scholar
  6. 6.
    M. Girault, J. Stern, On the length of cryptographic hash-values used in identification schemes, in Advances in Cryptology – CRYPTO’94. ed. by Y. Desmedt. Lecture Notes in Computer Science, vol. 839 (Springer, Heidelberg, 1994), pp. 202–215Google Scholar
  7. 7.
    S. Goldwasser, S. Micali, C. Rackoff, The knowledge complexity of interactive proof-systems (extended abstract), in Proceedings of the 17th Annual ACM Symposium on Theory of Computing, May 6–8, 1985, Providence, Rhode Island, USA, ed. by R. Sedgewick (ACM, New York, 1985), pp. 291–304. http://doi.acm.org/10.1145/22145.22178 Google Scholar
  8. 8.
    L.C. Guillou, J.J. Quisquater, A practical zero-knowledge protocol fitted to security microprocessor minimizing both trasmission and memory, in Advances in Cryptology – EUROCRYPT’88, ed. by C.G. Günther. Lecture Notes in Computer Science, vol. 330 (Springer, Heidelberg, 1988), pp. 123–128Google Scholar
  9. 9.
    C. Lavault, M. Valencia-Pabon, A distributed approximation algorithm for the minimum degree minimum weight spanning trees. J. Parallel Distrib. Comput. 68(2), 200–208 (2008)CrossRefGoogle Scholar
  10. 10.
    A.J. Mooij, N. Goga, J.W. Wesselink, A distributed spanning tree algorithm for topology-aware networks. Technische Universiteit Eindhoven, Department of Mathematics and Computer Science (2003)Google Scholar
  11. 11.
    A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, D.E. Culler, Spins: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)CrossRefGoogle Scholar
  12. 12.
    M. Singh, L.C. Lau, Approximating minimum bounded degree spanning trees to within one of optimal, in Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing (ACM, New York, 2007), pp. 661–670Google Scholar
  13. 13.
    S.K. Udgata, A. Mubeen, S.L. Sabat, Wireless sensor network security model using zero knowledge protocol, in 2011 IEEE International Conference on Communications (IEEE, Piscataway, 2011), pp. 1–5Google Scholar
  14. 14.
    M. Hashim, G. Santhosh Kumar, A. Sreekumar, Authentication in wireless sensor networks using zero knowledge protocol, in Computer Networks and Intelligent Computing. vol. 157 (Springer, Berlin, 2011), pp. 416–421Google Scholar
  15. 15.
    L. Zhang, B. Qin, Q. Wu, F. Zhang, Efficient many-to-one authentication with certificateless aggregate signatures. Comput. Netw. 54(14), 2482–2491 (2010)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Simon Cogliani
    • 1
  • Bao Feng
    • 2
  • Houda Ferradi
    • 1
  • Rémi Géraud
    • 1
  • Diana Maimuţ
    • 1
    • 3
  • David Naccache
    • 1
  • Rodrigo Portella do Canto
    • 1
  • Guilin Wang
    • 2
  1. 1.École normale supérieureParisFrance
  2. 2.Huawei Technologies Co. Ltd.ShenzhenChina
  3. 3.Advanced Technologies InstituteBucharestRomania

Personalised recommendations