CFP last date
20 January 2025
Reseach Article

Multicast Authentication Framework for Hierarchical Networks using Chinese Remainder Theorem

by Priyanka Sadananda, Wassim Trojet, Joseph Mouzna
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 82 - Number 11
Year of Publication: 2013
Authors: Priyanka Sadananda, Wassim Trojet, Joseph Mouzna
10.5120/14157-2233

Priyanka Sadananda, Wassim Trojet, Joseph Mouzna . Multicast Authentication Framework for Hierarchical Networks using Chinese Remainder Theorem. International Journal of Computer Applications. 82, 11 ( November 2013), 1-7. DOI=10.5120/14157-2233

@article{ 10.5120/14157-2233,
author = { Priyanka Sadananda, Wassim Trojet, Joseph Mouzna },
title = { Multicast Authentication Framework for Hierarchical Networks using Chinese Remainder Theorem },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 82 },
number = { 11 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume82/number11/14157-2233/ },
doi = { 10.5120/14157-2233 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:57:26.547149+05:30
%A Priyanka Sadananda
%A Wassim Trojet
%A Joseph Mouzna
%T Multicast Authentication Framework for Hierarchical Networks using Chinese Remainder Theorem
%J International Journal of Computer Applications
%@ 0975-8887
%V 82
%N 11
%P 1-7
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

For dense deployment of sensor nodes required in many environmental monitoring applications, an hierarchical network organization offers distinct advantages over flat networks. Broadcast and multicast, being the principle modes of communication in these networks, require confidentiality and authentication to prevent adversaries from broadcasting false messages. In this work, an authentication framework for hierarchical networks is proposed that permits authenticated and secure broadcast from base station as well as middle tier nodes using Chinese remainder theorem(CRT). The proposed protocol uses different prime numbers in each cluster to generate unique CRT solutions for authenticating multicast messages by cluster head. We shall describe our strategy for the distribution of prime numbers to establish initial trust in the network. Further, we shall prove that multicast authentication using CRT is ideal for clustered network organization in terms of energy efficiency and tolerance to attacks.

References
  1. M. Bri D. Sendra S Lloret, J. Garcia. A wireless sensor network deployment for rural and forest fire detection and verification. Sensors, 9:8722–8747, 2009.
  2. Steven D. Glaser. Some real-world applications of wireless sensor nodes. In In SPIE Symposium on Smart Structures Materials / NDE 2004, pages 344–355. SPIE Press, 2004.
  3. Jun He, Mahmoud Fallahi, Robert A. Norwood, and Nasser Peyghambarian. Smart border: ad-hoc wireless sensor networks for border surveillance. pages 80190Z–80190Z–7, 2011.
  4. W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks. In System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on, pages 10 pp. vol. 2–, 2000.
  5. O. Younis and Sonia Fahmy. Heed: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. Mobile Computing, IEEE Transactions on, 3(4):366–379, 2004.
  6. Mao Ye, Chengfa Li, Guihai Chen, Jie Wu, and Mao Ye Et. Al. Eecs: An energy efficient clustering scheme in wireless sensor networks. In In: Proc. of the IEEE Intl Performance Computing and Communications Conf, pages 535–540. IEEE Press, 2005.
  7. Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, and David E. Culler. Spins: security protocols for sensor networks. Wirel. Netw.
  8. Adrian Perrig, Ran Canetti, Dawn Song, and J. D. Tygar. Efficient and secure source authentication for multicast. In In Network and Distributed System Security Symposium, NDSS 01, pages 35–46, 2001.
  9. Hu Xiangdong and Feng Rui. Message broadcast authentication in utesla based on double filtering mechanism. In Internet Technology and Applications (iTAP), 2011 International Conference on, pages 1–4, 2011.
  10. Peng Ning, An Liu, and Wenliang Du. Mitigating dos attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sen. Netw.
  11. Donggang Liu and Peng Ning. Multi-level uTESLA: Broadcast authentication for distributed sensor networks. ACM Transactions in Embedded Computing Systems (TECS), 3(4):800–836, November 2004.
  12. Jianmin Zhang, Wenqi Yu, and Xiande Liu. Crtba: Chinese remainder theorem-based broadcast authentication in wireless sensor networks. In Computer Network and Multimedia Technology, 2009. CNMT 2009. International Symposium on, pages 1–4, 2009.
  13. Sonali S. Mhatre, Vandana B. Salve, and Sonali J. Mane. Article: Enhanced chinese remainder theorem based broadcast authentication in wireless networks. International Journal of Computer Applications, 50(15):10–14, July 2012. Published by Foundation of Computer Science, New York, USA.
  14. Sencun Zhu. Leap: Efficient security mechanisms for largescale distributed sensor networks. pages 62–72. ACM Press, 2003.
  15. L. B. Oliveira, Hao Cho Wang, and A. A F Loureiro. Lha-sp: secure protocols for hierarchical wireless sensor networks. In Integrated Network Management, 2005. IM 2005. 2005 9th IFIP/IEEE International Symposium on, pages 31–44, 2005.
  16. Leonardo B. Oliveira, Adrian Ferreira, Marco A. Vilac¸a, Hao Chi Wong, Marshall Bern, Ricardo Dahab, and Antonio A. F. Loureiro. Secleach-on the security of clustered sensor networks. Signal Process. , 87(12):2882–2895, December 2007.
  17. Mathias Bohge and Wade Trappe. An authentication framework for hierarchical ad hoc sensor networks. In Proceedings of the 2nd ACM workshop on Wireless security, WiSe '03, pages 79–87, New York, NY, USA, 2003. ACM.
  18. Jie Tian, Guiling Wang, Tan Yan, and Wensheng Zhang. A power-efficient scheme for securing multicast in hierarchical sensor networks. In Computer Communications and Networks, 2009. ICCCN 2009. Proceedings of 18th Internatonal Conference on, pages 1–6, 2009.
  19. Manna Research Group and Project Sensornet. MannaSim Framework. http://www. mannasim. dcc. ufmg. br/. [Online; accessed February 20,2013].
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Multicast Authentication Chinese Remainder Theorem