Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Enhanced Chinese Remainder Theorem based Broadcast Authentication in Wireless Networks

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 50 - Number 15
Year of Publication: 2012
Authors:
Sonali S. Mhatre
Vandana B. Salve
Sonali J. Mane
10.5120/7846-1054

Sonali S Mhatre, Vandana B Salve and Sonali J Mane. Article: Enhanced Chinese Remainder Theorem based Broadcast Authentication in Wireless Networks. International Journal of Computer Applications 50(15):10-14, July 2012. Full text available. BibTeX

@article{key:article,
	author = {Sonali S. Mhatre and Vandana B. Salve and Sonali J. Mane},
	title = {Article: Enhanced Chinese Remainder Theorem based Broadcast Authentication in Wireless Networks},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {50},
	number = {15},
	pages = {10-14},
	month = {July},
	note = {Full text available}
}

Abstract

Wireless networks make extensive use of broadcast messages. Many routing activities and network management activities needed in wireless networks must rely on broadcast authentication mechanisms to ensure that data is being originated from a valid source. Without an efficient broadcast authentication algorithm, the transmitting node would have to resort to per-node unicast messages, which does not scale to large networks and is easy to compromise also. The goal of this work is to provide an efficient scheme for sensor network broadcast authentication by considering different properties of broadcast authentication. Here, a protocol is proposed Enhanced Chinese Remainder Theorem based Broadcast Authentication (ECRTBA), for wireless sensor networks. ECRTBA uses Chinese Remainder Theorem to associate the authenticating procedure of the authentication key and the Message Authentication Code of broadcast messages together. The important feature the scheme is having is that it uses the concept of independent keys which support infinite rounds of broadcasts. The scheme also provides instant authentication with no need of buffering.

References

  • Mark Luk Adrian Perrig Bram Whillock Electrical and Computer Engineering Carnegie Mellon University, SASN'06, October 30, 2006, Alexandria, Virginia, USA, Seven Cardinal Properties of Sensor Network Broadcast Authentication, Copyright 2006 ACM 1-59593-554-1/06/0010
  • Adrian Perrig Ran Canetti J. D. Tygar Dawn Song, The TESLA Broadcast Authentication Protocol
  • Yongjie Fan, Ing-Ray Chen, and Mohamed Eltoweissy Department of Computer Science Virginia Tech, 2005, On Optimal Key Disclosure Interval for ?TESLA: Analysis of Authentication Delay versus Network Cost 0-7803-9305-8/05/$20. 00 ©2005 IEEE.
  • Yun Zhou, and Yuguang Fang, 2006, BABRA: Batch-based Broadcast Authentication in Wireless Sensor Networks, 1-4244-0357-X/06/$20. 00 © 2006 IEEE
  • Donggang Liu Peng Ning, Multi-Level ?TESLA: A Broadcast Authentication System for Distributed Sensor Networks
  • Jianmin Zhang, Wenqi Yu, Xiande Liu, 2009, CRTBA: Chinese Remainder Theorem-Based Broadcast Authentication in Wireless Sensor Networks, 978-1-4244-5273-6/09/$26. 00 ©2009 IEEE
  • Jawad Drissi and Qijun Gu. , 2006, Localized broadcast authentication in large sensor networks in ICNS, July 2006.
  • Xian Gan, Qiaoliang Li, 2009, A Multi-user DoS-containment Broadcast Authentication Scheme for Wireless Sensor Networks, 0018-9545/$26. 00 © 2009 IEEE.
  • Haowen Chan, Adrian Perrig Carnegie Mellon University Pittsburgh, Pennsylvania, USA, 2010, Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes IEEE Symposium on Security and Privacy
  • Kui Ren, Member, IEEE, Shucheng Yu, Student Member, IEEE, Wenjing Lou, Senior Member, IEEE and Yanchao Zhang, Member, IEEE, 2009, Multi-User Broadcast Authentication in Wireless Sensor Networks, IEEE Transactions On Vehicular Technology, Vol. 58, No. 8, October 2009.
  • Kui Ren, Member, IEEE, Wenjing Lou, Member, IEEE, Kai Zeng, Student Member, IEEE, And Patrick J. Moran, 2007, On Broadcast Authentication In Wireless Sensor Networks, IEEE Transactions On Wireless Communications, Vol. 6, No. 11, November 2007
  • Qijun Gu Jawad Drissi, 2007, Dominating Set based Overhead Reduction for Broadcast Authentication in Large Sensor Networks, Third International Conference on Networking and Services(ICNS'07) 0-7695-2858-9/07 $20. 00 © 2007
  • Xian Gan, Qiaoliang Li, 2009, A Multi-user DoS-containment Broadcast Authentication Scheme for Wireless Sensor Networks, 978-0-7695-3688-0/09 $25. 00 © 2009 IEEE DOI 10. 1109/ITCS. 2009. 10