Next Article in Journal
Next Article in Special Issue
Previous Article in Journal
Sensors 2010, 10(9), 8683-8695; doi:10.3390/s100908683
Article

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem

1
, 1,* , 1,2
 and 3
Received: 23 July 2010; in revised form: 23 August 2010 / Accepted: 6 September 2010 / Published: 17 September 2010
View Full-Text   |   Download PDF [173 KB, uploaded 21 June 2014]
Abstract: Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verification. However, it suffers from several flaws considering the delay tolerance, and the chain length restriction. In this paper, we propose a protocol which provides broadcast authentication for wireless sensor networks. This protocol uses a nested hash chain of two different hash functions and the Chinese Remainder Theorem (CRT). The two different nested hash functions are employed for the seed updating and the key generation. Each sensor node is challenged independently with a common broadcasting message using the CRT. Our algorithm provides forward and non-restricted key generation, and in addition, no time synchronization is required. Furthermore, receivers can instantly authenticate packets in real time. Moreover, the comprehensive analysis shows that this scheme is efficient and practical, and can achieve better performance than the μTESLA system.
Keywords: wireless sensor network; authenticated broadcast; nested hashing chains; Chinese Remainder Theorem wireless sensor network; authenticated broadcast; nested hashing chains; Chinese Remainder Theorem
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Export to BibTeX |
EndNote


MDPI and ACS Style

Eldefrawy, M.H.; Khan, M.K.; Alghathbar, K.; Cho, E.-S. Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem. Sensors 2010, 10, 8683-8695.

AMA Style

Eldefrawy MH, Khan MK, Alghathbar K, Cho E-S. Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem. Sensors. 2010; 10(9):8683-8695.

Chicago/Turabian Style

Eldefrawy, Mohamed Hamdy; Khan, Muhammad Khurram; Alghathbar, Khaled; Cho, Eun-Suk. 2010. "Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem." Sensors 10, no. 9: 8683-8695.


Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert