LSAP: Low Storage Authentication Protocol for cluster-based wireless sensor networks

Zhikui Chen, Zhuang Shao, Xiaodi Huang, Yang Liu

Research output: Book chapter/Published conference paperConference paper

Abstract

The cluster-based routing of wireless sensor networks (WSNs) requires secure, robust protocols for wireless communication. Unfortunately, existing protocols are unsuitable due to the limited storage space of nodes. Although symmetric-key-based solutions have been available, all of them suffer from possible severe attacks, and the problem of limited storage space. These issues are truly critical in WSNs. In this paper, a low storage authentication protocol (LSAP) is introduced to reduce the size requirement of authenticated keys, and thus to save the storage space. Moreover, security flaws are effectively avoided in the proposed protocol. Building upon a double-level key chain mechanism and message authentication code (MAC), the proposed LSAP includes two authentication phases: Base Station-node (BS-node) broadcast, and cluster head-member node. A quantitative analysis demonstrates that our proposed approach can balance the requirements of security and storage space.
Original languageEnglish
Title of host publicationIEEE Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
Place of PublicationUSA
PublisherIEEE
Pages218-225
Number of pages8
ISBN (Electronic)9781424452187
DOIs
Publication statusPublished - 2009
EventCyberC '09. International Conference - China, China
Duration: 10 Oct 200912 Oct 2009

Conference

ConferenceCyberC '09. International Conference
CountryChina
Period10/10/0912/10/09

Fingerprint Dive into the research topics of 'LSAP: Low Storage Authentication Protocol for cluster-based wireless sensor networks'. Together they form a unique fingerprint.

  • Cite this

    Chen, Z., Shao, Z., Huang, X., & Liu, Y. (2009). LSAP: Low Storage Authentication Protocol for cluster-based wireless sensor networks. In IEEE Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) (pp. 218-225). IEEE. https://doi.org/10.1109/CYBERC.2009.5342204