A practical inter-sensor broadcast authentication scheme

  • Joon Wan Kim*
  • , Yong Ho Kim
  • , Hwaseong Lee
  • , Dong Hoon Lee
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

For inter-sensor broadcast authentication in wireless sensor networks, Chen et al. proposed a bootstrapping scheme which enables to save only neighboring nodes' hash-chain commitments, much fewer than whole network size, before deployment [2]. However, the scheme lacks scalability and is not tolerant for node isolation. Therefore, we suggest new mechanism providing scalability and present its modified version with node-redemption which makes most of nodes participate in broadcast authentication with a little additional memory.

Original languageEnglish
Title of host publicationUniversal Access in Human-Computer Interaction
Subtitle of host publicationCoping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.
PublisherSpringer Verlag
Pages399-405
Number of pages7
EditionPART 1
ISBN (Print)9783540732785
DOIs
Publication statusPublished - 2007
Event4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007 - Beijing, China
Duration: 2007 Jul 222007 Jul 27

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 1
Volume4554 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007
Country/TerritoryChina
CityBeijing
Period07/7/2207/7/27

Keywords

  • Authentication
  • Security
  • Wireless sensor network

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'A practical inter-sensor broadcast authentication scheme'. Together they form a unique fingerprint.

Cite this