skip to main content
10.1145/1180345.1180364acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Seven cardinal properties of sensor network broadcast authentication

Published: 30 October 2006 Publication History

Abstract

We investigate the design space of sensor network broadcast authentication. We show that prior approaches can be organized based on a taxonomy of seven fundamental proprieties, such that each approach can satisfy at most six of the seven proprieties. An empirical study of the design space reveals possibilities of new approaches, which we present in the following two new authentication protocols: RPT and LEA. Based on this taxonomy, we offer guidance in selecting the most appropriate protocol based on an application's desired proprieties. Finally, we pose the open challenge for the research community to devise a protocol simultaneously providing all seven properties.

References

[1]
D. Boneh, G. Durfee, and M. Franklin. Lower bounds for multicast message authentication. In Advances in Cryptology -- EUROCRYPT '01, pages 434--450, 2001.]]
[2]
M. Brown, D. Cheung, D. Hankerson, J. Lopez Hernandez, M. Kirkup, and A. Menezes. PGP in constrained wireless devices. In Proceedings of USENIX Security Symposium, August 2000.]]
[3]
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast security: A taxonomy and some efficient constructions. In INFOCOMM'99, pages 708--716, March 1999.]]
[4]
J. Deng, R. Han, and S. Mishra. A performance evaluation of intrusion-tolerant routing in wireless sensor networks. In Proceedings of IEEE Workshop on Information Processing in Sensor Networks (IPSN), April 2003.]]
[5]
J. Deng, C. Hartung, R. Han, and S. Mishra. A practical study of transitory master key establishment for wireless sensor networks. In Proceedings of the First IEEE/CreateNet Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), 2005.]]
[6]
Jeremy Elson, Lewis Girod, and Deborah Estrin. Fine-grained network time synchronization using reference broadcasts. In Proceedings of Symposium on Operating Systems Design and Implementation (OSDI), December 2002.]]
[7]
Jeremy Elson and Kay Römer. Wireless sensor networks: A new regime for time synchronization. In Proceedings of Workshop on Hot Topics In Networks (HotNets-I), October 2002.]]
[8]
S. Even, O. Goldreich, and S. Micali. On-line/off-line digital signatures. In Advances in Cryptology -- CRYPTO '89, volume 435, pages 263--277, 1990.]]
[9]
Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, and Tadayoshi Kohno. Helix: Fast encryption and authentication in a single cryptographic primitive. In Proceedings of the International Workshop on Fast Software Encryption (FSE 2003), 2003.]]
[10]
V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, and S. C. Shantz. Sizzle: A standards-based end-to-end security architecture for the embedded internet. In Proceedings of the Third IEEE International Conference on Pervasive Computing and Communication (PerCom), 2005.]]
[11]
Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David E. Culler, and Kristofer S. J. Pister. System architecture directions for networked sensors. In Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS IX), pages 93--104, 2000.]]
[12]
Lingxuan Hu and David Evans. Secure aggregation for wireless networks. In Workshop on Security and Assurance in Ad hoc Networks, January 2003.]]
[13]
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of IEEE INFOCOM, April 2003.]]
[14]
J. M. Kahn, R. H. Katz, and K. S. Pister. Mobile networking for smart dust. In Proceedings of ACM/IEEE Conference on Mobile Computing and Networking (MobiCom), August 1999.]]
[15]
C. Karlof, N. Sastry, and D. Wagner. TinySec: A link layer security architecture for wireless sensor networks. In ACM SenSys, November 2004.]]
[16]
Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, and J. D. Tygar. Distillation codes and applications to dos resistant multicast authentication. In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS), November 2004.]]
[17]
Chris Karlof and David Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.]]
[18]
A. Lenstra and E. Verheul. Selecting cryptographic key sizes. Journal of Cryptology, 14(4):255--293, 2001.]]
[19]
D. Liu, P. Ning, S. Zhu, and S. Jajodia. Practical broadcast authentication in sensor networks. In Proceedings of The 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, November 2005.]]
[20]
Donggang Liu and Peng Ning. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In Proceedings of Network and Distributed System Security Symposium (NDSS),pages 263--276, February 2003.]]
[21]
David Malan, Matt Welsh, and Michael Smith. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In Proceedings of IEEE International Conference on Sensor and Ad hoc Communications and Networks (SECON), October 2004.]]
[22]
S. Matyas, C. Meyer, and J. Oseas. Generating strong one-way functions with cryptographic algorithm. IBM Technical Disclosure Bulletin, 27:5658--5659, 1985.]]
[23]
A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.]]
[24]
R. Merkle. Protocols for public key cryptosystems. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 122--134, April 1980.]]
[25]
R. Merkle. A digital signature based on a conventional encryption function. In Advances in Cryptology -- CRYPTO '87, pages 369--378, 1988.]]
[26]
R. Merkle. A certified digital signature. In Advances in Cryptology -- CRYPTO '89, pages 218--238, 1990.]]
[27]
National Institute of Standards and Technology (NIST), Computer Systems Laboratory. Secure Hash Standard. Federal Information Processing Standards Publication (FIPS PUB) 180--2, February 2004.]]
[28]
A. Perrig. The BiBa one-time signature and broadcast authentication protocol. In Proceedings of ACM Conference on Computer and Communications Security (CCS),pages 28--37, November 2001.]]
[29]
A. Perrig, R. Canetti, J. D. Tygar, and D. Song. Efficient authentication and signature of multicast streams over lossy channels. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 56--73, May 2000.]]
[30]
A. Perrig, R. Canetti, J. D. Tygar, and D. Song. The TESLA broadcast authentication protocol. RSA CryptoBytes, 5(Summer), 2002.]]
[31]
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of ACM Conference on Mobile Computing and Networks (MobiCom), pages 189--199, 2001.]]
[32]
Bartosz Przydatek, Dawn Song, and Adrian Perrig. SIA: Secure information aggregation in sensor networks. In Proceedings of the First ACM International Conference on Embedded Networked Sensor Systems (SenSys 2003), pages 255--265, November 2003.]]
[33]
Leonid Reyzin and Natan Reyzin. Better than BiBa: Short one-time signatures with fast signing and verifying. In Proceedings of Conference on Information Security and Privacy (ACISP), July 2002.]]
[34]
R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120--126, February 1978.]]
[35]
P. Rohatgi. A compact and fast hybrid signature scheme for multicast packet. In Proceedings of the 6th ACM Conference on Computer and Communications Security, pages 93--100. ACM Press, November 1999.]]
[36]
F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical en-route filtering of injected false data in sensor networks. In Proceedings of IEEE INFOCOM, March 2004.]]
[37]
S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy, pages 259--271, May 2004.]]

Cited By

View all
  • (2022)LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical SystemsIEEE Transactions on Smart Grid10.1109/TSG.2022.315689713:4(3214-3226)Online publication date: Jul-2022
  • (2021)PLGAKD: A PUF-Based Lightweight Group Authentication and Key Distribution ProtocolIEEE Internet of Things Journal10.1109/JIOT.2020.30327578:7(5682-5696)Online publication date: 1-Apr-2021
  • (2020)Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security AccessSensors10.3390/s2008223120:8(2231)Online publication date: 15-Apr-2020
  • Show More Cited By

Index Terms

  1. Seven cardinal properties of sensor network broadcast authentication

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
    October 2006
    186 pages
    ISBN:1595935541
    DOI:10.1145/1180345
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 October 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. broadcast authentication
    2. sensor network
    3. taxonomy

    Qualifiers

    • Article

    Conference

    CCS06
    Sponsor:

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical SystemsIEEE Transactions on Smart Grid10.1109/TSG.2022.315689713:4(3214-3226)Online publication date: Jul-2022
    • (2021)PLGAKD: A PUF-Based Lightweight Group Authentication and Key Distribution ProtocolIEEE Internet of Things Journal10.1109/JIOT.2020.30327578:7(5682-5696)Online publication date: 1-Apr-2021
    • (2020)Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security AccessSensors10.3390/s2008223120:8(2231)Online publication date: 15-Apr-2020
    • (2020)Spoofing and Anti-Spoofing Technologies of Global Navigation Satellite System: A SurveyIEEE Access10.1109/ACCESS.2020.30222948(165444-165496)Online publication date: 2020
    • (2020)OOS-SSS: An Efficient Online/Offline Subtree-Based Short Signature Scheme Using Chebyshev Chaotic Maps for Wireless Sensor NetworkIEEE Access10.1109/ACCESS.2020.29913488(80063-80073)Online publication date: 2020
    • (2020)Cybersecurity Issues in Wireless Sensor Networks: Current Challenges and SolutionsWireless Personal Communications10.1007/s11277-020-07213-5Online publication date: 10-Mar-2020
    • (2020)Internet of Things device authentication via electromagnetic fingerprintsEngineering Reports10.1002/eng2.122262:8Online publication date: 9-Jul-2020
    • (2018)Location-Based Protocol for the Pairwise Authentication in the Networks without InfrastructureProceedings of the 22st Conference of Open Innovations Association FRUCT10.5555/3266365.3266391(190-197)Online publication date: 21-May-2018
    • (2018)A Survey on Localized Authentication Protocols for Wireless Sensor Networks2018 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF)10.1109/WECONF.2018.8604433(1-7)Online publication date: Nov-2018
    • (2018)Experimental Comparison of Multicast Authentication for Wide Area Monitoring SystemsIEEE Transactions on Smart Grid10.1109/TSG.2017.26560679:5(4394-4404)Online publication date: Sep-2018
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media