Team for Research in
Ubiquitous Secure Technology

An Efficient Broadcast Authentication Scheme
Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh

Citation
Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh. "An Efficient Broadcast Authentication Scheme". ACM Symposium on Information, Computer and Communications Security, ACM, pp. 311-320, March, 2006.

Abstract
A broadcast authentication mechanism is important in wireless sensor networks, assuring receivers of a packetˇ¦s validity. To provide authentication, some researchers utilize one way key chains and delayed disclosure of keys; however, such an approach requires time synchronization and delayed authentication. Another technique uses one-time signature schemes. Unfortunately, such schemes suffer from large key sizes and a limited number of uses per key. To cope with these problems, we propose an efficient, one-time signature-based broadcast authentication scheme for wireless sensor networks that reduces storage usage and includes a re-keying mechanism.

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming
    Hsieh. <a
    href="http://www.truststc.org/pubs/69.html" >An
    Efficient Broadcast Authentication Scheme</a>, ACM
    Symposium on Information, Computer and Communications
    Security, ACM, pp. 311-320, March, 2006.
  • Plain text
    Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming
    Hsieh. "An Efficient Broadcast Authentication
    Scheme". ACM Symposium on Information, Computer and
    Communications Security, ACM, pp. 311-320, March, 2006.
  • BibTeX
    @inproceedings{ChangShiehLinHsieh06_EfficientBroadcastAuthenticationScheme,
        author = {Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin,
                  Chih-Ming Hsieh},
        title = {An Efficient Broadcast Authentication Scheme},
        booktitle = {ACM Symposium on Information, Computer and
                  Communications Security},
        organization = {ACM},
        pages = {pp. 311-320},
        month = {March},
        year = {2006},
        abstract = {A broadcast authentication mechanism is important
                  in wireless sensor networks, assuring receivers of
                  a packet¡¦s validity. To provide authentication,
                  some researchers utilize one way key chains and
                  delayed disclosure of keys; however, such an
                  approach requires time synchronization and delayed
                  authentication. Another technique uses one-time
                  signature schemes. Unfortunately, such schemes
                  suffer from large key sizes and a limited number
                  of uses per key. To cope with these problems, we
                  propose an efficient, one-time signature-based
                  broadcast authentication scheme for wireless
                  sensor networks that reduces storage usage and
                  includes a re-keying mechanism. },
        URL = {http://www.truststc.org/pubs/69.html}
    }
    

Posted by Shiuhpyng Winston Shieh, Professor on 26 Apr 2006.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.