Efficient Source Authentication Schemes in Wireless Sensor Networks

Wednesday 28 March 2012 - Wafa Ben Jaballah


Wednesday 28 March 2012 h. 11:00, room 2BC30
Wafa Ben Jaballah
"Efficient Source Authentication Schemes in Wireless Sensor Networks"

Wireless sensor networks (WSN) are being widely deployed in military, healthcare and commercial environments. Since sensor networks pose unique challenges, traditional security methods, commonly used in enterprise networks, cannot be directly applied. In particular, broadcast source authentication is a critical security service in wireless sensor networks since it allows senders to broadcast messages to multiple receivers in a secure way. Public-key cryptography based solutions such as Elliptic Curve Cryptography (ECC) and Identity Based Cryptography (IBC) have been proposed but they all suffer from severe energy depletion attacks, resulting from a high computational and communication overheads. We present novel symmetric-key-based authentication schemes that exhibit low broadcast authentication overhead and thus avoiding the problem flaws inherent to the public key cryptography based schemes. Our schemes are built upon the integration of multi-level ?Tesla protocol, staggered authentication and the Bloom Filter.
Experimental results demonstrate that our authentication schemes are very efficient in terms of authentication delay, authentication probability, delay of forged packets in the receiver’s buffer, memory, and energy consumption related to both computation and communication.

Download Seminari di Informatica

NEWS: New Second Level Degree in Data Science - Second cycle degree - a. y. 2017/18 X