Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters

  • Yu-Shian Chen
  • I-Lun Lin
  • Chin-Laung Lei
  • Yen-Hua Liao
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5067)

Abstract

We propose a light-weight and scalable broadcast authentication scheme, Curtain, for sensor network. Instead of using Merkel tree to combine multiple μTESLA instance, we apply compressed Bloom filters to multiple μTESLA. Our scheme can support longer duration and prolong the self-healing property. We greatly reduce the communication overhead at the cost of allocating a moderate space in each receiver. Combing with PKC computation like ECC, our scheme can guarantee the long-term security and also mitigate energy consumption. Moreover, our methods can be extend to the situation of multiple senders, offering efficient user addition and revocation.

Keywords

sensor networks network security broadcast authentication μTESLA Bloom filters 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: 7th ACM Annual International Conference on Mobile Computing and Networking, pp. 189–199. ACM Press, New York (2001)CrossRefGoogle Scholar
  2. 2.
    Liu, D., Ning, P.: Multilevel μTESLA: Broadcast Authentication for Distributed Sensor Networks. Trans. on Embedded Computing Sys. 3, 800 (2004)CrossRefGoogle Scholar
  3. 3.
    Liu, D., Ning, P., Zhu, S., Jajodia, S.: Practical Broadcast Authentication in Sensor Networks. In: 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), pp. 118–132. IEEE Computer Society, Los Alamitos (2005)Google Scholar
  4. 4.
    Menezes, A.J., Oorschot, P.C.v., Vanstone, S.A.: Handbook of Applied Cryptography, http://www.cacr.math.uwaterloo.ca/hac/
  5. 5.
    Eberle, H., Wander, A., Gura, N., Shantz, S.C., Gupta, V.: Architectural Extensions for Elliptic Curve Cryptography over GF(2m) on 8-bit Microprocessors. In: 16th IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP 2005), pp. 343–349. IEEE Computer Society, Los Alamitos (2005)CrossRefGoogle Scholar
  6. 6.
    Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., Shantz, S.C.: Sizzle: A Standards-Based End-to-end Security Architecture for the Embedded Internet. In: Third IEEE International Conference on Pervasive Computing and Communications, pp. 247–256. IEEE Computer Society, Los Alamitos (2005)CrossRefGoogle Scholar
  7. 7.
    Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17–36. Springer, Heidelberg (2005)Google Scholar
  8. 8.
    Luk, M., Perrig, A., Whillock, B.: Seven Cardinal Properties of Sensor Network Broadcast Authentication. In: Zhu, S., Liu, D. (eds.) SASN 2006, pp. 147–156. ACM Press, New York (2006)CrossRefGoogle Scholar
  9. 9.
    Mitzenmacher, M.: Compressed Bloom Filters. IEEE/ACM Trans. Netw. 10, 604 (2002)CrossRefGoogle Scholar
  10. 10.
    Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol. IEEE/ACM Trans. Netw. 8, 281 (2000)CrossRefGoogle Scholar
  11. 11.
    Perrig, A., Canetti, R., Tygar, D., Song, D.: The TESLA Broadcast Authentication Protocol. In: Cryptobytes, vol. 5(2), pp. 2–13. RSA Laboratories (2002)Google Scholar
  12. 12.
    Chang, S.-M., Shieh, S., Lin, W.W., Hsieh, C.-M.: An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks. In: Lin, F.-C., Lee, D.-T., Lin, B.-S., Shieh, S., Jajodia, S. (eds.) ASIACCS 2006, pp. 311–320. ACM, New York (2006)CrossRefGoogle Scholar
  13. 13.
    Luk, M., Ghita, M., Perrig, A., Gligor, V.: Minisec: A Secure Sensor Network Communication Architecture. In: Abdelzaher, T.F., Guibas, L.J., Welsh, M. (eds.) IPSN 2007, pp. 479–488. ACM Press, New York (2007)CrossRefGoogle Scholar
  14. 14.
    Ren, K., Lou, W., Zhang, Y.: Multi-user Broadcast Authentication in Wireless Sensor Networks. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 223–232. IEEE Computer Society, Los Alamitos (2007)CrossRefGoogle Scholar
  15. 15.
    Wang, R., Du, W., Ning, P.: Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks. In: Kranakis, E., Belding, E., Modiano, E. (eds.) MobiHoc 2007, pp. 71–79. ACM Press, New York (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Yu-Shian Chen
    • 1
  • I-Lun Lin
    • 1
  • Chin-Laung Lei
    • 1
  • Yen-Hua Liao
    • 1
  1. 1.Department of Electrical EngineeringNational Taiwan UniversityTaipeiTaiwan

Personalised recommendations