CFP last date
20 December 2024
Reseach Article

Efficient Broadcast Authentication using TSG Algorithm for WSN

by M. Premkumar, M. Kathiravan, R. Thirukkumaran
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 58 - Number 4
Year of Publication: 2012
Authors: M. Premkumar, M. Kathiravan, R. Thirukkumaran
10.5120/9273-3463

M. Premkumar, M. Kathiravan, R. Thirukkumaran . Efficient Broadcast Authentication using TSG Algorithm for WSN. International Journal of Computer Applications. 58, 4 ( November 2012), 34-39. DOI=10.5120/9273-3463

@article{ 10.5120/9273-3463,
author = { M. Premkumar, M. Kathiravan, R. Thirukkumaran },
title = { Efficient Broadcast Authentication using TSG Algorithm for WSN },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 58 },
number = { 4 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume58/number4/9273-3463/ },
doi = { 10.5120/9273-3463 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:01:37.978421+05:30
%A M. Premkumar
%A M. Kathiravan
%A R. Thirukkumaran
%T Efficient Broadcast Authentication using TSG Algorithm for WSN
%J International Journal of Computer Applications
%@ 0975-8887
%V 58
%N 4
%P 34-39
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Networks (WSN) is an emerging technology that has a wide range of applications including environment monitoring, medical systems, robotic exploration and smart places. In most of the sensor network sink node send broadcast information to all other sensor nodes. Broadcast authentication is an important security mechanism in a Wireless Sensor Network. . Base station broadcast the public key to all the sensor nodes. Broadcast message authenticated by using public key. If single key is used throughout the life time, adversaries can easily listen to the communication between the sensor nodes and the base station. To overcome this short term keys are introduced. In shortPK, the base stations broadcast a set of many short length encrypted keys for all the sensor nodes for every short term. The encrypted key contains message and next phase key. Due to long propagation of encrypted keys throughout the network causes propagation delay, decryption failure and packet loss. To overcome this problem we proposed Tree based Short term Group key Algorithm (TSGA) to reduce packet loss and enhance security mechanism by using short term group key in wireless sensor networks. The basic idea of the project is to use many short length group keys to provide the broadcast authentication in wireless sensor networks. The overall network is constructed as tree from base station and the parent and child nodes are established for different levels. Depends on level in tree network group will be formed. The encryption and decryption takes place within the group itself so the propagation delay of public key and packet loss will be reduced. Our simulation result shows that the packet loss is reduced and the data transmission also more secured than previous schemes. .

References
  1. Gennaro. R. and Rohatgi. P. , 1997. "How to sign digital streams", In Technical report, IBM T. J. Watson Research Centre.
  2. Lam. S. and Wong. C. , 1998. "Digital signatures for flows and multicasts", In Proceedings of the 6th IEEE International Conference on Network Protocols (ICNP '98) Austin, TX.
  3. Boneh. D. and Durfee. G. , 1999. "Cryptanalysis of RSA with private key d less than N0. 292", Lecture Notes in Computer Science 1592, 1–9.
  4. Golle. P. and Modadugu. N. , 2001. "Authenticating streamed data in the presence of random packet loss". In Proceedings of the Network and Distributed System Security Symposium (NDSS '01), San Diego, CA.
  5. Perrig. A. , 2001. "The BiBa one-time signature and broadcast authentication protocol", In Proceedings of the ACM Conference on Computer and Communications Security (CCS '01). Philadelphia PA, USA, 28–37.
  6. Canetti. R. , Perrig. A. , Song. D. and Tygar. D. , 2001. "Efficient and secure source authentication for Multicast", In Proceedings of Network and Distributed System Security Symposium (NDSS '01). San Diego.
  7. Cullar. D. Perrig. A. , Szewczyk. R. , Tygar. J. D and Wen. V. , 2001. "Spins: Security protocols for sensor networks", In Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MobiCom '01). Rome, Italy, 189–199.
  8. Song. D. , Tygar. J. D. and Zuckerman. D. , 2002. "Expander graphs for digital stream authentication and robust overlay networks", In Proceedings of IEEE Symposium of Security and Privacy (IEEE S&P '02). Oakland.
  9. Donggang Liu and Peng Ning, 2002. "Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks", Department of Computer Science, North Carolina State University, available at dliu@unity. ncsu. edu, ning@csc. ncsu. edu.
  10. Eberle. H. , Gura. N. , Patel. A. , Shantz. S. C. and Wander. A. , 2004. "Comparing Elliptic Curve Cryptography and RSA On 8-Bit CPUs". In Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES '04). Cambridge, MA, USA.
  11. Ning. P. , 2006. "Tinyecc: Elliptic Curve Cryptography for Sensor Networks", Cyber Defense Lab, North Carolina State University, available at http://discovery. csc. ncsu. edu/pning/software/TinyECC/index. html.
  12. Peng Ning, Ronghua Wang, Wenliang Du and Xiaogang Liu, 2010. "shortPK: A Short-Term Public Key Scheme for Broadcast Authentication in Sensor Networks", North Carolina State University, ACM Transactions on Sensor Networks.
  13. Colegrove. A. , Harney. H. and McDaniel. P. , 2001. "Principles of policy in secure groups". In network and distributed systems security symposium.
  14. Network Simulator 2, available at http://www. isi. edu/nsnam/ns/.
  15. Cristina Nita-Rotaru, Gene Tsudik Yair Amir and Yongdae Kim, 2003. "On the Performance of Group Key Agreement Protocols", University of California, ACM Transactions on Sensor Networks.
  16. Fenner, W, 1997. "Internet group management protocol", version 2, RFC-2236.
  17. Harney, H. , and Muckenhirn, C, 1997. "Group key management protocol (gkmp) architecture", IETF Request for Comments, RFC 2094 .
  18. Ravi Krishna. B and Vijaya saradhi M. V. , 2009. "A Group Key Management Approach for Multicast Cryptosystems", journal of Theoretical and Applied Information Technology, 104-109.
Index Terms

Computer Science
Information Sciences

Keywords

Depth creation group key establishment parent node TSGA