Cryptography Reference
In-Depth Information
5.3.4 Description of Identity-Based Multiuser Broadcast
Authentication in Wireless Sensor Networks (IMBAS)
In this scheme, sensor node-to-node communication uses algorithms mentioned in
v
BNN-IBS algorithms (Section 5.3.3.1). One of the crucial functions of the sink
node is to broadcast data related to routing-tree construction that would result in
a larger message size. Hence, to improve efficiency it is recommended to use the
Schnorr signature scheme with partial message recovery to secure sink node to ordi-
nary node communication.
5.3.4.1 IMBAS for Node-to-Node Communication
IMBAS consists of
System Initialization
,
User Addition
,
Message Broadcast and
Authentication
, and
User Revocation
System Initialization
:
The sink node selects
x
Z
p
and the system public key
P
0
=
xP
. System parameters
012
PP
=
EFPpPHH
/,
,
,
,
,
are loaded into each sensor node of the network.
q
User Addition
:
The sensor nodes in the network choose their unique IDs and send a request for a
private key corresponding to this ID. The sink node verifies the identity and then gen-
erates a private key (
R
,
s
) for the respective sensor node. The key extraction algorithm
used in this scheme is similar to the
v
BNN-IBS scheme.
Authentication
:
A sensor node in the network would broadcast a message that contains the following
information: <
m
,
tt
,
ID
,Sig{
m
,
tt
,
ID
}>, where the Sig indicates the
v
BNN-IBS signature
algorithm. In addition, the
tt
refers to the time when the signature was generated.
Verification
:
Upon receiving the authenticated broadcast message, the respective end users validate
the time stamp
tt
and then verify the broadcast signature using the verification algo-
rithm, as mentioned in Section 5.3.3.1.
5.3.4.2 IMBAS for Sink-to-Node Communication
Because the sink uses the Schnorr signature to generate a private key pair for each user
and the Schnorr signature is more efficient than
v
BNN-IBS, it will still use the Schnorr
signature to secure its broadcast. The messages broadcasted by the sink are inclusive of
certain data value, such as the data distributed for routing-tree construction. Hence, the
message size will be longer. To reduce the overall message size, the Schnorr signature
Search WWH ::
Custom Search