An Expedited Triple Key Broadcast Authentication Scheme Based on Tesla , Ecdh , and Ecdsa

نویسندگان

  • RAMESH KUMAR
  • GNANA DHAS
چکیده

Wireless Sensor Networks (WSNs) are prone to various security breaches as they are placed in hostile environments. Several security and broadcast authentication mechanisms were proposed for securing the WSN fully via key exchange mechanisms, handshake protocols, and other routing protocols. But these existing schemes cannot detect a variety of attacks and are not competent in terms of detection accuracy, resiliency, memory consumption, and transmission energy. An expedited triple key broadcast authentication scheme is proposed based on TESLA (Timed Efficient Stream Loss-tolerant Authentication) protocol, ECDH (Elliptic Curve Diffie-Hellman) key agreement scheme, and ECDSA (Elliptic Curve Digital Signature Algorithm). The signature verification process is accelerated by releasing few intermediate computation results in the WSN by the sensor nodes. This WSN authentication scheme performs better compared to other security schemes, in terms of accuracy, detection of attacks, resiliency, memory consumption, nodal detection, and average of total transmission energy consumed per node.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Analysis of Broadcast Authentication and Security Schemes in Wireless Sensor Networks

Wireless Sensor Networks (WSNs) are susceptible to various attacks as they are placed in hostile environments. Several security and authentication mechanisms are proposed for in terms of key exchange mechanisms, handshake protocols, and other routing protocols. The proposed triple key based broadcast authentication protocol is compared with the several other existing security schemes in WSN. Th...

متن کامل

Full Paper: Flexible, Extensible, and Efficient VANET Authentication

The authentication of VANET messages continues to be an important research challenge. Although much research has been conducted in the area of message authentication in wireless networks, VANETs pose unique challenges, such as real-time constraints, processing limitations, memory constraints, requirements for interoperability with existing standards, extensibility and flexibility for future req...

متن کامل

Design an Enhanced Certificate Based Authentication Protocol for Wireless Sensor Networks

In wireless sensor networks (WSN’s), the broadcast authentication is a critical security service, as it helps users to broadcast the WSN in an authenticable way. μ TESLA and MULTILEVEL μ TESLA are symmetric key based schemes, that have been introduced to provide such services for WSNs, but even they suffer from serious DoS attacks due to the delay in message authentication. Hence in order to ov...

متن کامل

Public Key Infrastructure (PKI) using Symmetric Key Cryptography (SC) in VANETs

Vehicular Ad-Hoc Network (VANETs) provides the vehicle to vehicle (V2V) communication for the safety application. There are many security requirements in VANETs. ECDSA algorithm fulfils all the security requirements but it’s come with the processing overhead and there is a chance of computation based DoS attack. However the VANETs are the time constrained each safety message should be reached a...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013