Abstract

Broadcast authentication is a fundamental security primitive in wireless sensor networks (WSNs), which is a critical sensing component of IoT. Although symmetric-key-based μTESLA protocol has been proposed, some concerns about the difficulty of predicting the network lifecycle in advance and the security problems caused by an overlong long hash chain still remain. This paper presents a scalable broadcast authentication scheme named DH-μTESLA, which is an extension and improvement of μTESLA and Multilevel μTESLA, to achieve several vital properties, such as infinite lifecycle of hash chains, security authentication, scalability, and strong tolerance of message loss. The proposal consists of the t,n-threshold-based self-reinitializable hash chain scheme (SRHC-TD) and the d-left-counting-Bloom-filter-based authentication scheme (AdlCBF). In comparison to other broadcast authentication protocols, our proposal achieves more security properties such as fresh node’s participation and DoS resistance. Furthermore, the reinitializable hash chain constructed in SRHC-TD is proved to be secure and has less computation and communication overhead compared with typical solutions, and efficient storage is realized based on AdlCBF, which can also defend against DoS attacks.

Highlights

  • With the rapid development of Internet of ings (IoT) and 5G technology, the number of sensing terminals, such as various sensor nodes and tiny IoT devices, has increased dramatically [1,2,3]

  • In AdlCBF scheme, the fresh node can be authenticated by the base station using the ECDSA signature and the fingerprint of the node

  • Our paper focuses on the key management and distribution of broadcast authentication in the combination of wireless sensor networks (WSNs) and edge computing with consideration of efficient storage and security issue caused by overlong hash chains, which are important issues in IoT application scenarios

Read more

Summary

Introduction

With the rapid development of Internet of ings (IoT) and 5G technology, the number of sensing terminals, such as various sensor nodes and tiny IoT devices, has increased dramatically [1,2,3]. Edge computing is a new emerging paradigm that overcomes the scalability problem of traditional wireless sensor networks (WSNs) architecture [4,5,6,7]. E combination of wireless sensor networks and edge computing can more effectively deploy the network and process a large amount of sensory data from sensor nodes. E broadcast authentication protocol in wireless sensor network needs to meet the following three principles [12]: (1) any malicious. Security and Communication Networks receiver being able to hardly forge any packet from the sender; (2) low communication, computation, and storage overheads; and (3) tolerance of message loss or fault. With the continuous concern regarding broadcast authentication, some novel protocols [15,16,17,18,19] sequentially emerge in WSNs, followed by the Multilevel μTESLA protocol

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call