• DocumentCode
    2020521
  • Title

    Providing hop-by-hop authentication and source privacy in wireless sensor networks

  • Author

    Yun Li ; Jian Li ; Jian Ren ; Jie Wu

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Michigan State Univ., East Lansing, MI, USA
  • fYear
    2012
  • fDate
    25-30 March 2012
  • Firstpage
    3071
  • Lastpage
    3075
  • Abstract
    Message authentication is one of the most effective ways to thwart unauthorized and corrupted traffic from being forwarded in wireless sensor networks (WSNs). To provide this service, a polynomial-based scheme was recently introduced. However, this scheme and its extensions all have the weakness of a built-in threshold determined by the degree of the polynomial: when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we propose a scalable authentication scheme based on elliptic curve cryptography (ECC). While enabling intermediate node authentication, our proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem. In addition, our scheme can also provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is more efficient than the polynomial-based approach in terms of communication and computational overhead under comparable security levels while providing message source privacy.
  • Keywords
    data privacy; message authentication; polynomials; public key cryptography; telecommunication security; telecommunication traffic; wireless sensor networks; ECC; WSN; built-in threshold; communication overhead; computational overhead; elliptic curve cryptography; hop-by-hop authentication; intermediate node authentication; message authentication; message source privacy; polynomial-based scheme; scalable authentication scheme; security level; wireless sensor network; Authentication; Message authentication; Polynomials; Privacy; Public key; Hop-by-hop authentication; public-key cryptosystem; source privacy; symmetric-key cryptosystem;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    INFOCOM, 2012 Proceedings IEEE
  • Conference_Location
    Orlando, FL
  • ISSN
    0743-166X
  • Print_ISBN
    978-1-4673-0773-4
  • Type

    conf

  • DOI
    10.1109/INFCOM.2012.6195761
  • Filename
    6195761