• DocumentCode
    25693
  • Title

    Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks

  • Author

    Jian Li ; Yun Li ; Jian Ren ; Jie Wu

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Michigan State Univ., East Lansing, MI, USA
  • Volume
    25
  • Issue
    5
  • fYear
    2014
  • fDate
    May-14
  • Firstpage
    1223
  • Lastpage
    1232
  • Abstract
    Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. To address these issues, a polynomial-based scheme was recently introduced. However, this scheme and its extensions all have the weakness of a built-in threshold determined by the degree of the polynomial: when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial. In this paper, we propose a scalable authentication scheme based on elliptic curve cryptography (ECC). While enabling intermediate nodes authentication, our proposed scheme allows any node to transmit an unlimited number of messages without suffering the threshold problem. In addition, our scheme can also provide message source privacy. Both theoretical analysis and simulation results demonstrate that our proposed scheme is more efficient than the polynomial-based approach in terms of computational and communication overhead under comparable security levels while providing message source privacy.
  • Keywords
    message authentication; public key cryptography; wireless sensor networks; ECC; WSN; elliptic curve cryptography; hop-by-hop message authentication; intermediate nodes authentication; message source privacy; polynomial-based scheme; public-key cryptosystems; symmetric-key cryptosystems; wireless sensor networks; Authentication; Message authentication; Polynomials; Privacy; Public key; Wireless sensor networks; Hop-by-hop authentication; decentralized control; distributed algorithm; public-key cryptosystem; simulation; source privacy; symmetric-key cryptosystem; wireless sensor networks (WSNs);
  • fLanguage
    English
  • Journal_Title
    Parallel and Distributed Systems, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1045-9219
  • Type

    jour

  • DOI
    10.1109/TPDS.2013.119
  • Filename
    6504456