A practical inter-sensor broadcast authentication scheme

Joon Wan Kim, Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

For inter-sensor broadcast authentication in wireless sensor networks, Chen et al. proposed a bootstrapping scheme which enables to save only neighboring nodes' hash-chain commitments, much fewer than whole network size, before deployment [2]. However, the scheme lacks scalability and is not tolerant for node isolation. Therefore, we suggest new mechanism providing scalability and present its modified version with node-redemption which makes most of nodes participate in broadcast authentication with a little additional memory.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages399-405
Number of pages7
Volume4554 LNCS
EditionPART 1
Publication statusPublished - 2007 Dec 1
Event4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007 - Beijing, China
Duration: 2007 Jul 222007 Jul 27

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 1
Volume4554 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007
CountryChina
CityBeijing
Period07/7/2207/7/27

Fingerprint

Broadcast
Authentication
Scalability
Sensor
Sensors
Vertex of a graph
Wireless sensor networks
Hash Chain
Data storage equipment
Bootstrapping
Isolation
Wireless Sensor Networks

Keywords

  • Authentication
  • Security
  • Wireless sensor network

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Kim, J. W., Kim, Y. H., Lee, H., & Lee, D. H. (2007). A practical inter-sensor broadcast authentication scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (PART 1 ed., Vol. 4554 LNCS, pp. 399-405). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4554 LNCS, No. PART 1).

A practical inter-sensor broadcast authentication scheme. / Kim, Joon Wan; Kim, Yong Ho; Lee, Hwaseong; Lee, Dong Hoon.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4554 LNCS PART 1. ed. 2007. p. 399-405 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4554 LNCS, No. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, JW, Kim, YH, Lee, H & Lee, DH 2007, A practical inter-sensor broadcast authentication scheme. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 1 edn, vol. 4554 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), no. PART 1, vol. 4554 LNCS, pp. 399-405, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007, Beijing, China, 07/7/22.
Kim JW, Kim YH, Lee H, Lee DH. A practical inter-sensor broadcast authentication scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 1 ed. Vol. 4554 LNCS. 2007. p. 399-405. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); PART 1).
Kim, Joon Wan ; Kim, Yong Ho ; Lee, Hwaseong ; Lee, Dong Hoon. / A practical inter-sensor broadcast authentication scheme. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4554 LNCS PART 1. ed. 2007. pp. 399-405 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); PART 1).
@inproceedings{27ffd7105b724df4a669c2d6cae1e382,
title = "A practical inter-sensor broadcast authentication scheme",
abstract = "For inter-sensor broadcast authentication in wireless sensor networks, Chen et al. proposed a bootstrapping scheme which enables to save only neighboring nodes' hash-chain commitments, much fewer than whole network size, before deployment [2]. However, the scheme lacks scalability and is not tolerant for node isolation. Therefore, we suggest new mechanism providing scalability and present its modified version with node-redemption which makes most of nodes participate in broadcast authentication with a little additional memory.",
keywords = "Authentication, Security, Wireless sensor network",
author = "Kim, {Joon Wan} and Kim, {Yong Ho} and Hwaseong Lee and Lee, {Dong Hoon}",
year = "2007",
month = "12",
day = "1",
language = "English",
isbn = "9783540732785",
volume = "4554 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
number = "PART 1",
pages = "399--405",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
edition = "PART 1",

}

TY - GEN

T1 - A practical inter-sensor broadcast authentication scheme

AU - Kim, Joon Wan

AU - Kim, Yong Ho

AU - Lee, Hwaseong

AU - Lee, Dong Hoon

PY - 2007/12/1

Y1 - 2007/12/1

N2 - For inter-sensor broadcast authentication in wireless sensor networks, Chen et al. proposed a bootstrapping scheme which enables to save only neighboring nodes' hash-chain commitments, much fewer than whole network size, before deployment [2]. However, the scheme lacks scalability and is not tolerant for node isolation. Therefore, we suggest new mechanism providing scalability and present its modified version with node-redemption which makes most of nodes participate in broadcast authentication with a little additional memory.

AB - For inter-sensor broadcast authentication in wireless sensor networks, Chen et al. proposed a bootstrapping scheme which enables to save only neighboring nodes' hash-chain commitments, much fewer than whole network size, before deployment [2]. However, the scheme lacks scalability and is not tolerant for node isolation. Therefore, we suggest new mechanism providing scalability and present its modified version with node-redemption which makes most of nodes participate in broadcast authentication with a little additional memory.

KW - Authentication

KW - Security

KW - Wireless sensor network

UR - http://www.scopus.com/inward/record.url?scp=38149049337&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=38149049337&partnerID=8YFLogxK

M3 - Conference contribution

SN - 9783540732785

VL - 4554 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 399

EP - 405

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -