A practical inter-sensor broadcast authentication scheme

Joon Wan Kim, Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

For inter-sensor broadcast authentication in wireless sensor networks, Chen et al. proposed a bootstrapping scheme which enables to save only neighboring nodes' hash-chain commitments, much fewer than whole network size, before deployment [2]. However, the scheme lacks scalability and is not tolerant for node isolation. Therefore, we suggest new mechanism providing scalability and present its modified version with node-redemption which makes most of nodes participate in broadcast authentication with a little additional memory.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages399-405
Number of pages7
Volume4554 LNCS
EditionPART 1
Publication statusPublished - 2007 Dec 1
Event4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007 - Beijing, China
Duration: 2007 Jul 222007 Jul 27

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 1
Volume4554 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007
CountryChina
CityBeijing
Period07/7/2207/7/27

Keywords

  • Authentication
  • Security
  • Wireless sensor network

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'A practical inter-sensor broadcast authentication scheme'. Together they form a unique fingerprint.

  • Cite this

    Kim, J. W., Kim, Y. H., Lee, H., & Lee, D. H. (2007). A practical inter-sensor broadcast authentication scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (PART 1 ed., Vol. 4554 LNCS, pp. 399-405). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4554 LNCS, No. PART 1).