Cryptography Reference
In-Depth Information
5.3.4 Description of Identity-Based Multiuser Broadcast
Authentication in Wireless Sensor Networks (IMBAS)
In this scheme, sensor node-to-node communication uses algorithms mentioned in
v BNN-IBS algorithms (Section 5.3.3.1). One of the crucial functions of the sink
node is to broadcast data related to routing-tree construction that would result in
a larger message size. Hence, to improve efficiency it is recommended to use the
Schnorr signature scheme with partial message recovery to secure sink node to ordi-
nary node communication.
5.3.4.1 IMBAS for Node-to-Node Communication
IMBAS consists of System Initialization , User Addition , Message Broadcast and
Authentication , and User Revocation
System Initialization :
The sink node selects x Z p and the system public key P 0 = xP . System parameters
012
PP
=
EFPpPHH
/,
,
,
,
,
are loaded into each sensor node of the network.
q
User Addition :
The sensor nodes in the network choose their unique IDs and send a request for a
private key corresponding to this ID. The sink node verifies the identity and then gen-
erates a private key ( R , s ) for the respective sensor node. The key extraction algorithm
used in this scheme is similar to the v BNN-IBS scheme.
Authentication :
A sensor node in the network would broadcast a message that contains the following
information: < m , tt , ID ,Sig{ m , tt , ID }>, where the Sig indicates the v BNN-IBS signature
algorithm. In addition, the tt refers to the time when the signature was generated.
Verification
Upon receiving the authenticated broadcast message, the respective end users validate
the time stamp tt and then verify the broadcast signature using the verification algo-
rithm, as mentioned in Section 5.3.3.1.
5.3.4.2 IMBAS for Sink-to-Node Communication
Because the sink uses the Schnorr signature to generate a private key pair for each user
and the Schnorr signature is more efficient than v BNN-IBS, it will still use the Schnorr
signature to secure its broadcast. The messages broadcasted by the sink are inclusive of
certain data value, such as the data distributed for routing-tree construction. Hence, the
message size will be longer. To reduce the overall message size, the Schnorr signature
Search WWH ::




Custom Search