Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016, Article ID 9021650, 13 pages
http://dx.doi.org/10.1155/2016/9021650
Research Article

An Improved μTESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs

1College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
2Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China
3Department of Computer Science, College of Engineering, North Carolina State University, Raleigh, NC 27695, USA

Received 15 March 2016; Accepted 5 July 2016

Academic Editor: Iftikhar Ahmad

Copyright © 2016 Haiping Huang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Xu, M. Wen, and J. Li, “A bidirectional broadcasting authentication scheme for wireless sensor networks,” in Proceedings of the IEEE Conference on Collaboration and Internet Computing (CIC ’15), pp. 200–204, Hangzhou, China, October 2015. View at Publisher · View at Google Scholar
  2. A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS: security protocols for sensor networks,” Wireless Networks, vol. 8, no. 5, pp. 521–534, 2002. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Perrig, R. Canetti, D. Song, and J. D. Tygar, “Efficient and secure source authentication for multicast,” in Proceedings of the Network and Distributed System Security Symposium (NDSS ’01), pp. 35–46, San Diego, Calif, USA, February 2001.
  4. A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “Efficient authentication and signing of multicast streams over lossy channels,” in Proceedings of the IEEE Symposium on Security and Privacy (S&P ’00), pp. 56–73, Berkeley, Calif, USA, May 2000. View at Publisher · View at Google Scholar
  5. M. H. Eldefrawy, M. K. Khan, and K. Alghathbar, “One-time password system with infinite nested Hash chains,” in Security Technology, Disaster Recovery and Business Continuity, pp. 161–170, Springer, Berlin, Germany, 2010. View at Google Scholar
  6. S.-H. Ou, C.-H. Lee, V. S. Somayazulu, Y.-K. Chen, and S.-Y. Chien, “On-line multi-view video summarization for wireless video sensor network,” IEEE Journal on Selected Topics in Signal Processing, vol. 9, no. 1, pp. 165–179, 2015. View at Publisher · View at Google Scholar · View at Scopus
  7. G. Oligeri, S. Chessa, R. Di Pietro, and G. Giunta, “Robust and efficient authentication of video stream broadcasting,” ACM Transactions on Information and System Security, vol. 14, no. 1, article 5, pp. 1–25, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. A. Huszti, “Anonymous multi-vendor micropayment scheme based on bilinear maps,” in Proceedings of the International Conference on Information Society (i-Society ’14), pp. 25–30, IEEE, London, UK, November 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. X. Zhang and J. Wang, “An efficient key management scheme in hierarchical wireless sensor networks,” in Proceedings of the International Conference on Computing, Communication and Security (ICCCS ’15), pp. 1–7, Pamplemousses, Mauritius, December 2015. View at Publisher · View at Google Scholar
  10. D. Liu and P. Ning, “Multilevel μTESLA,” ACM Transactions on Embedded Computing Systems (TECS), vol. 3, no. 4, pp. 800–836, 2004. View at Publisher · View at Google Scholar
  11. H. Jiang, J. Zhai, S. K. Wahba, B. Mazumder, and J. O. Hallstrom, “Fast distributed simulation of sensor networks using optimistic synchronization,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 11, pp. 2888–2898, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. J. H. Lee, L. H. Kim, and T. Y. Kwon, “FlexiCast: energy-efficient software integrity checks to build secure industrial wireless active sensor networks,” IEEE Transactions on Industrial Informatics, vol. 12, no. 1, pp. 6–14, 2016. View at Publisher · View at Google Scholar
  13. X. Li, N. Ruan, F. Wu, J. Li, and M. Li, “Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA,” in Proceedings of the 33rd IEEE International Performance Computing and Communications Conference (IPCCC ’14), pp. 1–8, Austin, Tex, USA, December 2014. View at Publisher · View at Google Scholar · View at Scopus
  14. Y.-S. Chen, I.-L. Lin, C.-L. Lei, and Y.-H. Liao, “Broadcast authentication in sensor networks using compressed bloom filters,” in Distributed Computing in Sensor Systems, pp. 9–111, Springer, Berlin, Germany, 2008. View at Google Scholar
  15. K. Ren, S. Yu, W. Lou, and Y. Zhang, “Multi-user broadcast authentication in wireless sensor networks,” IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4554–4564, 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. M. Sharifi, S. S. Kashi, and S. P. Ardakani, “LAP: a lightweight authentication protocol for smart dust wireless sensor networks,” in Proceedings of the International Symposium on Collaborative Technologies and Systems (CTS ’09), pp. 258–265, Baltimore, Md, USA, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  17. C. Benzaid, S. Medjadba, A. Al-Nemrat, and N. Badache, “Accelerated verification of an ID-based signature scheme for broadcast authentication in wireless sensor networks,” in Proceedings of the IEEE 15th International Conference on Computational Science and Engineering (CSE ’12), pp. 633–639, Nicosia, Cyprus, December 2012. View at Publisher · View at Google Scholar
  18. K. Ren, W. Lou, B. Zhu, and S. Jajodia, “Secure and efficient multicast in wireless sensor networks allowing ad hoc group formation,” IEEE Transactions on Vehicular Technology, vol. 58, no. 4, pp. 2018–2029, 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. X. Cao, W. Kou, L. Dang, and B. Zhao, “IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks,” Computer Communications, vol. 31, no. 4, pp. 659–667, 2008. View at Publisher · View at Google Scholar · View at Scopus
  20. R. D. Pietro, F. Martinelli, and N. V. Verde, “Broadcast authentication for resource constrained devices: a major pitfall and some solutions,” in Proceedings of the 31st IEEE International Symposium on Reliable Distributed Systems (SRDS ’12), pp. 213–218, Irvine, Calif, USA, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. C. Qiu, H. Shen, S. Soltani, K. Sapra, H. Jiang, and J. O. Hallstrom, “CEDAR: a low-latency and distributed strategy for packet recovery in wireless networks,” IEEE/ACM Transactions on Networking (TON), vol. 23, no. 5, pp. 1514–1527, 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. Y.-C. Zhao and D.-B. Li, “An elegant construction of re-initializable hash chains,” Journal of Electronics & Information Technology, vol. 28, no. 9, pp. 1717–1720, 2006. View at Google Scholar · View at Scopus
  23. H. Zhang and Y. Zhu, “Self-updating hash chains and their implementations,” in Web Information Systems-WISE 2006, pp. 387–397, Springer, Berlin, Germany, 2006. View at Google Scholar
  24. H. Zhang, X. Li, and R. Ren, “A novel self-renewal hash chain and its implementation,” in Proceedings of the 5th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC ’08), pp. 144–149, Shanghai, China, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  25. M.-Q. Zhang, B. Dong, and X.-Y. Yang, “A new self-updating hash chain structure scheme,” in Proceedings of the International Conference on Computational Intelligence and Security (CIS ’09), pp. 315–318, Beijing, China, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  26. Z. Wei, “Self-updating hash chains based on erasure coding,” in Proceedings of the International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE ’10), pp. 173–175, Changchun, China, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  27. X.-Y. Yang, J.-J. Wang, J.-Y. Chen, and X.-Z. Pan, “A self-renewal hash chain scheme based on fair exchange idea(SRHC-FEI),” in Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT ’10), pp. 152–156, Chengdu, China, July 2010. View at Publisher · View at Google Scholar · View at Scopus