This article is
- freely available
Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
Center of Excellence in Information Assurance (CoEIA), King Saud University, PO Box 92144, Riyadh 11653, Saudi Arabia
Information Systems Department, College of Computer and Information Sciences, King Saud University, Saudi Arabia
Department of Multimedia, Hannam University, 133 Ojeong-dong, Daedeok-gu, Daejeon 306-791, Korea
* Author to whom correspondence should be addressed.
Received: 23 July 2010; in revised form: 23 August 2010 / Accepted: 6 September 2010 / Published: 17 September 2010
Abstract: Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verification. However, it suffers from several flaws considering the delay tolerance, and the chain length restriction. In this paper, we propose a protocol which provides broadcast authentication for wireless sensor networks. This protocol uses a nested hash chain of two different hash functions and the Chinese Remainder Theorem (CRT). The two different nested hash functions are employed for the seed updating and the key generation. Each sensor node is challenged independently with a common broadcasting message using the CRT. Our algorithm provides forward and non-restricted key generation, and in addition, no time synchronization is required. Furthermore, receivers can instantly authenticate packets in real time. Moreover, the comprehensive analysis shows that this scheme is efficient and practical, and can achieve better performance than the μTESLA system.
Keywords: wireless sensor network; authenticated broadcast; nested hashing chains; Chinese Remainder Theorem
Article StatisticsClick here to load and display the download statistics.
Notes: Multiple requests from the same IP address are counted as one view.
Cite This Article
MDPI and ACS Style
Eldefrawy, M.H.; Khan, M.K.; Alghathbar, K.; Cho, E.-S. Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem. Sensors 2010, 10, 8683-8695.
Eldefrawy MH, Khan MK, Alghathbar K, Cho E-S. Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem. Sensors. 2010; 10(9):8683-8695.
Eldefrawy, Mohamed Hamdy; Khan, Muhammad Khurram; Alghathbar, Khaled; Cho, Eun-Suk. 2010. "Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem." Sensors 10, no. 9: 8683-8695.