用于资源受限设备的轻量级安全组通信

Wafa Ben Jaballah, M. Mosbah, H. Youssef, A. Zemmari
{"title":"用于资源受限设备的轻量级安全组通信","authors":"Wafa Ben Jaballah, M. Mosbah, H. Youssef, A. Zemmari","doi":"10.1504/IJSSC.2015.073696","DOIUrl":null,"url":null,"abstract":"Providing source authentication service in wireless sensor networks (WSNs) is still a potential stumbling block to the wide deployment of these resource constrained devices. In this paper, we present several broadcast authentication solutions that have been developed for secure group communications in WSNs, and we come up with two novel symmetric-key-based authentication schemes. Our protocols are built upon the integration of a reputation generator on each node, a key binary tree for the efficient distribution and updating of the authentication group keys. Moreover, we refer to a Bloom filter data structure to reduce the communication overhead. We assess the feasibility of our two proposed schemes with a thorough mathematical study, estimating the average number of concatenated message authentication code, the energy consumption overhead, and the probability of detection of two state-of-the-art attacks.","PeriodicalId":43931,"journal":{"name":"International Journal of Space-Based and Situated Computing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Lightweight secure group communications for resource constrained devices\",\"authors\":\"Wafa Ben Jaballah, M. Mosbah, H. Youssef, A. Zemmari\",\"doi\":\"10.1504/IJSSC.2015.073696\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Providing source authentication service in wireless sensor networks (WSNs) is still a potential stumbling block to the wide deployment of these resource constrained devices. In this paper, we present several broadcast authentication solutions that have been developed for secure group communications in WSNs, and we come up with two novel symmetric-key-based authentication schemes. Our protocols are built upon the integration of a reputation generator on each node, a key binary tree for the efficient distribution and updating of the authentication group keys. Moreover, we refer to a Bloom filter data structure to reduce the communication overhead. We assess the feasibility of our two proposed schemes with a thorough mathematical study, estimating the average number of concatenated message authentication code, the energy consumption overhead, and the probability of detection of two state-of-the-art attacks.\",\"PeriodicalId\":43931,\"journal\":{\"name\":\"International Journal of Space-Based and Situated Computing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Space-Based and Situated Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJSSC.2015.073696\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Space-Based and Situated Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJSSC.2015.073696","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

在无线传感器网络(wsn)中提供源认证服务仍然是这些资源受限设备广泛部署的潜在障碍。本文介绍了针对无线传感器网络中安全组通信而开发的几种广播认证方案,并提出了两种新的基于对称密钥的认证方案。我们的协议建立在每个节点上的信誉生成器的集成之上,这是一个用于有效分发和更新身份验证组密钥的密钥二叉树。此外,我们引用了Bloom过滤器数据结构来减少通信开销。我们通过彻底的数学研究评估了我们提出的两种方案的可行性,估计了连接消息认证代码的平均数量、能耗开销以及检测到两种最先进攻击的概率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Lightweight secure group communications for resource constrained devices
Providing source authentication service in wireless sensor networks (WSNs) is still a potential stumbling block to the wide deployment of these resource constrained devices. In this paper, we present several broadcast authentication solutions that have been developed for secure group communications in WSNs, and we come up with two novel symmetric-key-based authentication schemes. Our protocols are built upon the integration of a reputation generator on each node, a key binary tree for the efficient distribution and updating of the authentication group keys. Moreover, we refer to a Bloom filter data structure to reduce the communication overhead. We assess the feasibility of our two proposed schemes with a thorough mathematical study, estimating the average number of concatenated message authentication code, the energy consumption overhead, and the probability of detection of two state-of-the-art attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Space-Based and Situated Computing
International Journal of Space-Based and Situated Computing COMPUTER SCIENCE, INFORMATION SYSTEMS-
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信