JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Operating μTESLA based on Variable Key-Slot in Multi-Hop Unattended WSN
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Operating μTESLA based on Variable Key-Slot in Multi-Hop Unattended WSN
Choi, JinChun; Kang, Jeonil; Nyang, DaeHun; Lee, KyungHee;
  PDF(new window)
 Abstract
As a broadcast message authentication method in wireless sensor networks, TESLA enables sensor nodes efficiently authenticate message from base station (BS). However, if we use TESLA that has very short length of key slot in unattended wireless sensor network (UWSN), sensors may calculate a huge amount of hashs at once in order to verify the revealed secret key. In contrast, if we set the length of TESLA's key slot too long in order to reduce the amount of hashs to calculate, BS should wait out the long slot time to release key. In this paper, we suggest variable key slot TESLA in order to mitigate the problem. As showing experiment results, we prove that our suggestion improve sensor node's response time and decrease of number of hash function calculation.
 Keywords
WSN Security;TESLA;Broadcast Authentication;NS-2;
 Language
Korean
 Cited by
 References
1.
A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, "SPINS: Security protocols for sensor networks," J. Wirel. netw., vol. 8, no. 5, pp. 521-534, Sept. 2002. crossref(new window)

2.
Y. Cho and S. Lee, "An IDE based hierarchical node authentication protocol for secure data transmission in WSN environment," The Korean Inst. Commun. Inf. Sci., vol. 37B, no. 3, pp. 149-157, 2012. crossref(new window)

3.
Y. Wang, L. Hu, J. F. Chu, and X. B. Xu, "Analysis and improvement for SPINS," J. Netw., vol. 8, no. 1, pp. 229-236, Jan. 2013.

4.
Z. S. Bojkovic, B. M. Bakmaz, and M. R. Bakmaz, "Security issues in wireless sensor networks," Int. J. Commun., vol. 2, no. 1, pp. 106-115, 2008.

5.
A. Perrig and R. Canetti, "Efficient and secure source authentication for multicast," Netw. Distributed Syst. Security Symp., NDSS, vol. 1, pp. 35-46, Feb. 2001.

6.
D. Liu and P. Ning, "Multilevel ${\mu}$ TESLA: Broadcast authentication for distributed sensor networks," ACM Trans. Embedded Computing Syst., vol. 3, no. 4, pp. 800-836, 2004. crossref(new window)

7.
C. H. Lim, "New constructions of multi-level ${\mu}$TESLA with immediate authentication," Korea Inst. Inf. Security & Cryptography, vol. 16, no. 6, pp. 163-167, 2006.

8.
R. Du and S. Wen, "An improved scheme of ${\mu}$TESLA authentication based trusted computing platform," Int. Conf. Wirel. Commun., Netw. Mobile Comput., 2008 (WiCOM'08), pp. 1-4, 2008.

9.
Y. Z. Y. Zhou and Y. F. Y. Fang, "WSN09-1: BABRA: Batch-based broadcast authentication in wireless sensor networks," IEEE GLOBECOM 2006, pp. 1-5, San Francisco, CA, 2006.

10.
M. Di Francesco and K. Shah, "An adaptive strategy for energy-efficient data collection in sparse wireless sensor networks," Wirel. Sensor Netw., pp. 322-337, 2010.

11.
F. S. Babamir and a. Norouzi, "Achieving key privacy and invisibility for unattended wireless sensor networks in healthcare," The Comput. J., May 2013.

12.
Crossbow, MICAz Data Sheet, 6020-0060-04 Rev A, from http://www.openautomation.net/uploadsproductos/micaz_datasheet.pdf

13.
P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, and M. Sichitiu, "Analyzing and modeling encryption overhead for sensor network nodes," in Proc. ACM Int. conf. Wirel. sensor netw. appl.-WSNA '03, pp. 151-159, 2003