Authentication for Bulk Data Dissemination in Sensor Networks Using Symmetric Keys

Authentication for Bulk Data Dissemination in Sensor Networks Using Symmetric Keys
Author :
Publisher :
Total Pages : 26
Release :
ISBN-10 : OCLC:227926717
ISBN-13 :
Rating : 4/5 (17 Downloads)

Book Synopsis Authentication for Bulk Data Dissemination in Sensor Networks Using Symmetric Keys by :

Download or read book Authentication for Bulk Data Dissemination in Sensor Networks Using Symmetric Keys written by and published by . This book was released on 2007 with total page 26 pages. Available in PDF, EPUB and Kindle. Book excerpt: Authenticating bulk data dissemination in sensor networks is important as sensors need to verify that the data is truly from a trusted source. There are two ways to achieve authentication: asymmetric key based and symmetric key based. Although previous work has shown that asymmetric key authentication is feasible on sensor nodes if used sparingly, it is still quite expensive compared to symmetric key based approach. In this paper, we propose a symmetric key based protocol for authenticating data dissemination process. Our protocol uses the secret instantiation algorithm for distributing the keys. We apply the symmetric key signatures at the segment/group level and use hashed verification at the packet level. To improve the efficiency in the presence of packet loss/delay, we employ several techniques: the double connected hash chain, the caching scheme, and forward error correction (FEC). We show the effectiveness of our design through simulation. Moreover, since our protocol has much lower cost than the asymmetric key based approaches, it is especially valuable for the burst data dissemination, where the base station authenticates and transmits a moderate amount of data at a time.


Authentication for Bulk Data Dissemination in Sensor Networks Using Symmetric Keys Related Books

Authentication for Bulk Data Dissemination in Sensor Networks Using Symmetric Keys
Language: en
Pages: 26
Authors:
Categories:
Type: BOOK - Published: 2007 - Publisher:

DOWNLOAD EBOOK

Authenticating bulk data dissemination in sensor networks is important as sensors need to verify that the data is truly from a trusted source. There are two way
Applied Informatics and Communication, Part I
Language: en
Pages: 765
Authors: Dehuai Zheng
Categories: Computers
Type: BOOK - Published: 2011-08-02 - Publisher: Springer

DOWNLOAD EBOOK

The five volume set CCIS 224-228 constitutes the refereed proceedings of the International conference on Applied Informatics and Communication, ICAIC 2011, held
Energy Efficient Reprogramming for Sensor Networks
Language: en
Pages: 404
Authors: Limin Wang
Categories: Sensor networks
Type: BOOK - Published: 2007 - Publisher:

DOWNLOAD EBOOK

Secure and Efficient Use of Public Key Cryptography in Sensor Networks
Language: en
Pages: 135
Authors: Ronghua Wang
Categories: Computer science
Type: BOOK - Published: 2007 - Publisher:

DOWNLOAD EBOOK

Public key operations were considered impractical for wireless sensor networks due to their high computational cost. However, public keys are important for many
Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries
Language: en
Pages: 9
Authors:
Categories:
Type: BOOK - Published: 2006 - Publisher:

DOWNLOAD EBOOK

Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code im