SEARCH WITHIN CONTENT
Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 6, Issue 4, Pages 1,653-1,674, DOI: https://doi.org/10.21307/ijssis-2017-609
License : (CC BY-NC-ND 4.0)
Received Date : 30-March-2013 / Accepted: 15-July-2013 / Published Online: 05-September-2013
The authentication of broadcast sources is one of the most important research issues in the area of network security. To confirm that the control information received is from the genuine management nodes, the message broadcasted from management nodes must be verifiable for the working nodes. In this paper, a highly reliable WSN broadcast authentication protocol based-on one-way key chain, namely, the ESKA, is presented. For the purpose of comparison, a group of simulations are conducted. The results have demonstrated that compared with μTESLA, the presented method is of lower authentication delay and higher authentication rate in large broadcast data traffic transmission, meanwhile reducing considerable communication overheads in those applications.
 Vasanth Iyer, Garimella Ram Murthy, M.B. Srinivas, “Training Data Compression Algorithms and Reliability in Large Wireless Sensor Networks[J]”, International Journal On Smart Sensing And Intelligent Systems, Vol. 1, No. 4, December 2008, pp. 912-921,.
 Wenyan Fu, Deshi Li, Jian chen, Yanyan Han, Jugen Nie, “Topology Optimization Control with Balanced Energy and Load in Underwater Acoustic Sensor Networks[J]”, International Journal On Smart Sensing And Intelligent Systems Vol. 4, No. 1, March 2011, pp. 138-159.
 Sye Loong Keoh, Emil Lupu, Morris Sloman, “Securing Body Sensor Networks: Sensor Association and Key Management[C]”, IEEE International Conference on Pervasive Computing and Communications, IEEE Computer Society, 2009, pp. 53-65.
 Du Xiaoming, Chen Yan, “Review on Research status and application of wireless sensor networks [J]”, Beijing Business University (Natural Science Edition), Vol. 26, No.1, 2008, pp. 41–44.
 Lang Weimin, Yang Zongkai, “Research on wireless sensor network security [J]”, Computer Science, Vol. 32, No.2, 2008, pp. 54-58.
 James Newsome, Elaine Shi, Song Dawn, “The Sybil Attack in Sensor Networks Analysis& Defenses[C]”, In: Proc of Third Intl .Symposium on Information Processing in Sensor Networks (IPSN’ 04), Berkeley, California. USA: ACM press, 2004, pp. 259-268, .
 Callaway E H. “Wireless Sensor Networks: Architectures and Protocols [M]”, Routledge USA: Auerbach Publications, 2004, pp. 45-57 .
 Chris Karlof, David Wagner, “Ad hoc Secure routing in wireless sensor networks: attacks and countermeasures [J]”,Ad Hoc Networks, Vol. 1, No.2-3, 2003, pp. 293-315,.
 T.Jayakumar, C.Babu Rao, John Philip, “Sensors For Monitoring Components, Systems And Processes[J]”, International Journal On Smart Sensing And Intelligent Systems, Vol. 3, No. 1, March 2010, pp. 61-74.
 Tien-Wen Sung, Ting-Ting Wu, Chu-Sing Yang, Yueh-Min Huang, “Reliable Data Broadcast for Zigbee Wireless Sensor Networks[J]”, International Journal On Smart Sensing And Intelligent Systems, Vol. 3, No. 3, September 2010, pp. 504-520.
 Mel Siegel, “Scaling Issues in Large Networks of Small Sensors: Energy and Communication Management [J]”, International Journal on Smart Sensing and Intelligent Systems, Vol. 1, No. 1, March 2008, pp. 285-299.
Liu Dongang, Peng Ning, “Multi-level μTESLA: Broadcast Authentication for Distributed Sensor Networks[J]”. ACM Transactions in Embedded Computing Systems, Vol. 3, No.4, November 2004, pp. 800-836.
 Sencun Zhu , Sanjeev Setia, Sushil Jajodia , “LEAP+: efficient security mechanisms for large-scale distributed sensor networks[C]”, ACM Transactions on Sensor Networks ,Volume 2 Issue 4, November 2006, pp. 500-528 .
 Liu An, Peng Ning, “TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks[C]”, 2008. IPSN '08. International Conference on Information Processing in Sensor Networks, 2008, pp. 245 - 256,.
 Arvinderpal S. Wander , Nils Gura , Hans Eberle , “Energy Analysis of Public--key Cryptography on Small Wireless Devices[C]”, In: Proceedings of the 3rd IEEE Intl Conference on Pervasive Computing and Communications. California: IEEE Computer Society Press, 2005, pp. 324-328.
 Piotrowski Krzysztof, Langendoerfer Peter, Peter Steffen, “How public key cryptography influences wireless sensor node lifetime[C]”, Proceeding of the 4th ACM Workshop on Security of AdHoc and Sensor Networks, New York: ACM Press(SASN 2007) , pp. 169-176, .
 Ian. F. Akyildiz, Weilian Su, Yogesh.Sankarasubramaniam, Erdal Cayirci. “Wireless Sensor Networks: A Survey [J]”, Computer Networks, Vol. 38, 2002, pp. 393-422.
 Adrian Perrig,Robert Szewczyk,J.D. Tygar,Victor Wen,David E. Culler, “SPINS: Security Protocols for Sensor Networks[J]”, Wireless Networks, Vol. 8, No.5, 2002, pp. 521-534.
 Hu.Yih-Chun, Jakobsson.Markus, Perrig.Adrian, “Efficient constructions for one-way hash chains[C]”, Applied Cryptography and Network Security. Third International Conference, ACNS 2005. Proceedings (Lecture Notes in Computer Science Vol. 3531), 2005, pp. 423-41.
 Kui Ren, Shucheng Yu, Wenjing Lou, Yanchao Zhang, “Multi-user Broadcast Authentication in Wireless Sensor Networks”, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007, pp. 223-32.