CFP last date
20 May 2024
Reseach Article

Enhanced Chinese Remainder Theorem based Broadcast Authentication in Wireless Networks

by Sonali S. Mhatre, Vandana B. Salve, Sonali J. Mane
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 50 - Number 15
Year of Publication: 2012
Authors: Sonali S. Mhatre, Vandana B. Salve, Sonali J. Mane
10.5120/7846-1054

Sonali S. Mhatre, Vandana B. Salve, Sonali J. Mane . Enhanced Chinese Remainder Theorem based Broadcast Authentication in Wireless Networks. International Journal of Computer Applications. 50, 15 ( July 2012), 10-14. DOI=10.5120/7846-1054

@article{ 10.5120/7846-1054,
author = { Sonali S. Mhatre, Vandana B. Salve, Sonali J. Mane },
title = { Enhanced Chinese Remainder Theorem based Broadcast Authentication in Wireless Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 50 },
number = { 15 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 10-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume50/number15/7846-1054/ },
doi = { 10.5120/7846-1054 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:49:09.462947+05:30
%A Sonali S. Mhatre
%A Vandana B. Salve
%A Sonali J. Mane
%T Enhanced Chinese Remainder Theorem based Broadcast Authentication in Wireless Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 50
%N 15
%P 10-14
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless networks make extensive use of broadcast messages. Many routing activities and network management activities needed in wireless networks must rely on broadcast authentication mechanisms to ensure that data is being originated from a valid source. Without an efficient broadcast authentication algorithm, the transmitting node would have to resort to per-node unicast messages, which does not scale to large networks and is easy to compromise also. The goal of this work is to provide an efficient scheme for sensor network broadcast authentication by considering different properties of broadcast authentication. Here, a protocol is proposed Enhanced Chinese Remainder Theorem based Broadcast Authentication (ECRTBA), for wireless sensor networks. ECRTBA uses Chinese Remainder Theorem to associate the authenticating procedure of the authentication key and the Message Authentication Code of broadcast messages together. The important feature the scheme is having is that it uses the concept of independent keys which support infinite rounds of broadcasts. The scheme also provides instant authentication with no need of buffering.

References
  1. Mark Luk Adrian Perrig Bram Whillock Electrical and Computer Engineering Carnegie Mellon University, SASN'06, October 30, 2006, Alexandria, Virginia, USA, Seven Cardinal Properties of Sensor Network Broadcast Authentication, Copyright 2006 ACM 1-59593-554-1/06/0010
  2. Adrian Perrig Ran Canetti J. D. Tygar Dawn Song, The TESLA Broadcast Authentication Protocol
  3. Yongjie Fan, Ing-Ray Chen, and Mohamed Eltoweissy Department of Computer Science Virginia Tech, 2005, On Optimal Key Disclosure Interval for ?TESLA: Analysis of Authentication Delay versus Network Cost 0-7803-9305-8/05/$20. 00 ©2005 IEEE.
  4. Yun Zhou, and Yuguang Fang, 2006, BABRA: Batch-based Broadcast Authentication in Wireless Sensor Networks, 1-4244-0357-X/06/$20. 00 © 2006 IEEE
  5. Donggang Liu Peng Ning, Multi-Level ?TESLA: A Broadcast Authentication System for Distributed Sensor Networks
  6. Jianmin Zhang, Wenqi Yu, Xiande Liu, 2009, CRTBA: Chinese Remainder Theorem-Based Broadcast Authentication in Wireless Sensor Networks, 978-1-4244-5273-6/09/$26. 00 ©2009 IEEE
  7. Jawad Drissi and Qijun Gu. , 2006, Localized broadcast authentication in large sensor networks in ICNS, July 2006.
  8. Xian Gan, Qiaoliang Li, 2009, A Multi-user DoS-containment Broadcast Authentication Scheme for Wireless Sensor Networks, 0018-9545/$26. 00 © 2009 IEEE.
  9. Haowen Chan, Adrian Perrig Carnegie Mellon University Pittsburgh, Pennsylvania, USA, 2010, Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes IEEE Symposium on Security and Privacy
  10. Kui Ren, Member, IEEE, Shucheng Yu, Student Member, IEEE, Wenjing Lou, Senior Member, IEEE and Yanchao Zhang, Member, IEEE, 2009, Multi-User Broadcast Authentication in Wireless Sensor Networks, IEEE Transactions On Vehicular Technology, Vol. 58, No. 8, October 2009.
  11. Kui Ren, Member, IEEE, Wenjing Lou, Member, IEEE, Kai Zeng, Student Member, IEEE, And Patrick J. Moran, 2007, On Broadcast Authentication In Wireless Sensor Networks, IEEE Transactions On Wireless Communications, Vol. 6, No. 11, November 2007
  12. Qijun Gu Jawad Drissi, 2007, Dominating Set based Overhead Reduction for Broadcast Authentication in Large Sensor Networks, Third International Conference on Networking and Services(ICNS'07) 0-7695-2858-9/07 $20. 00 © 2007
  13. Xian Gan, Qiaoliang Li, 2009, A Multi-user DoS-containment Broadcast Authentication Scheme for Wireless Sensor Networks, 978-0-7695-3688-0/09 $25. 00 © 2009 IEEE DOI 10. 1109/ITCS. 2009. 10
Index Terms

Computer Science
Information Sciences

Keywords

CRT(Chinese Remainder Theorem) CRTBA(Chinese Remainder Theorem based Broadcast Authentication) ECRTBA (Enhanced Chinese Remainder Theorem based Broadcast Authentication) CAS(Certificate based authentication Scheme) (DAS) Direct storage based Authentication Scheme.