A Novel DiDrip Protocol with Dissemination-Privilege Pair Authentication

P.Lakshmi Durga, Y.Yesu Jyothi

Abstract


It is an attempt to enhance the DiDrip protocol. There are some efficiency problems caused by the generation, transmission, and verification of certificates. First, it is not efficient in communication, as the certificate has to be transmitted along with the advertisement packet across every hop as the message propagates in the WSN. A large per-message overhead will result in more energy consumption on each sensor node. Second, to authenticate each advertisement packet, it always takes two expensive signature verification operations because the certificate should always be authenticated first. Once a new user joins the network after the network deployment, the network owner can notify the sensor nodes of the user’s public key/dissemination privilege through using the private key of itself. To enhance secure and distributed data discovery and dissemination protocol (DiDrip), we have planned to use Hop by Hop Message authentication scheme for ensuring data confidentiality.


References


J. W. Hui and D. Culler, “The dynamic behavior of a data disseminationprotocol for network programming at scale,” in Proc. 2ndInt. Conf. Embedded Netw. Sensor Syst., 2004, pp. 81–94.

D. He, C. Chen, S. Chan, and J. Bu, “DiCode: DoS-resistant anddistributed code dissemination in wireless sensor networks,”IEEE Trans. Wireless Commun., vol. 11, no. 5, pp. 1946–1956, May2012.

T.Dang,N. Bulusu,W. Feng, and S. Park, “DHV:Acode consistencymaintenance protocol for multi-hop wireless sensor networks,” inProc. 6th Eur. Conf.Wireless Sensor Netw., 2009, pp. 327–342.

G. Tolle and D. Culler, “Design of an application-cooperativemanagement system for wireless sensor networks,” in Proc. Eur.Conf. Wireless Sensor Netw., 2005, pp. 121–132.

K. Lin and P. Levis, “Data discovery and dissemination withDIP,” in Proc. ACM/IEEE Int. Conf. Inf. Process. Sensor Netw., 2008,pp. 433–444.

M. Ceriotti, G. P. Picco, A. L. Murphy, S. Guna, M. Corra, M.Pozzi, D. Zonta, and P. Zanon, “Monitoring heritage buildingswith wireless sensor networks: The Torre Aquila deployment,” inProc. IEEE Int. Conf. Inf. Process. Sensor Netw., 2009, pp. 277–288.

D. He, S. Chan, S. Tang, and M. Guizani, “Secure data discoveryand dissemination based on hash tree for wireless sensornetworks,” IEEE Trans. Wireless Commun., vol. 12, no. 9, pp. 4638–4646, Sep. 2013.

M. Rahman, N. Nasser, and T. Taleb, “Pairing-based secure timingsynchronization for heterogeneous sensor networks,” in Proc.IEEE Global Telecommun. Conf., 2008, pp. 1–5.

Geoss. [Online]. Available: http://www.epa.gov/geoss/

NOPP. [Online]. Available: http://www.nopp.org/

ORION. [Online]. Available: http://www.joiscience.org/oceanobserving/advisors

P. Levis, N. Patel, D. Culler, and S. Shenker, “Trickle: A self-regulatingalgorithm for code maintenance and propagation in wirelesssensor networks,” in Proc. 1st Conf. Symp. Netw. Syst. Design

Implementation, 2004, pp. 15–28.

A. Perrig, R. Canetti, D. Song, and J. Tygar, “Efficient and securesource authentication for multicast,” in Proc. Netw. Distrib. Syst.Security Symp., 2001, pp. 35–46.

Y. Chen, I. Lin, C. Lei, and Y. Liao, “Broadcast authentication insensor networks using compressed bloom filters,” in Proc. 4thIEEE Int. Conf. Distrib. Comput. Sensor Syst., 2008, pp. 99–111.

R. Merkle, “Protocols for public key cryptosystems,” in Proc. IEEESecurity Privacy, 1980, pp. 122–134.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.