Broadcast Authentication WSN Protocols-Tesla and Biba
Broadcast Authentication WSN Protocols-Tesla and Biba
Data integrity ensures that data has not been altered by unauthorized
entities.
3. Freshness
Packets that have been captured and replayed at a later time should be
ignored by the sensor nodes.
4. Delay Tolerance
5. Confidentiality
6. Denial-of-Service Attack
This attack challenges the backward hashing with small values to respond
with the chain initial values.
6. In TESLA, the elements of the one-way chain are keys, so the chain is
called as a one-way key chain. Furthermore, any key of the one-way key
chain commits to all following keys, so such a key is called ad a one-
way key chain commitment, or simply key chain commitment.
7. Time Synchronization in TESLA - Time Synchronization in TESLA
does not need the strong time synchronization properties that
sophisticated time synchronization protocols provide, but only requires
loose time synchronization, and that the receiver knows an upper bound
• The TESLA protocol meets all these requirements with low cost
and it has the following special requirements,
• The sender and the receivers must be at least loosely time-
synchronized.
Sender Setup
(i) TESLA uses self-authenticating one-way chains. The sender divides the
time into uniform intervals of duration Tint. Time interval 0 will start at
timeT0,time interval 1 at timeT1=T0+Tint, etc. The sender assigns one
key from the one-way chain to each time interval in sequence. The one-
way chain is used in the reverse order of generation, so any value of a
time interval can be used to derive values of previous time intervals.
The sender determines the length N of the one-way chainK0,K1,...,KN,
and this length limits the maximum transmission duration before a new
one-way chain must be created.
(ii) The sender picks a random value for KN. Using a pseudo-random
function f, the sender constructs the one-way function F: F(k) = fk(0).
The remainder of the chain is computed recursively using Ki = F(Ki+1).
(iii) Note that this gives Ki = FN−i(KN), so one can compute any value
in the key chain from KN even if it does not have intermediate values.
Each key Ki will be active in time interval i.
(iv) The time synchronization property that TESLA requires is that each
receiver can place an upper bound of the sender’s local time.
(v) The sender sends the key disclosure schedule by transmitting the
following information to the receivers over an authenticated channel
(either via a digitally signed broadcast message, or over unicast with
each receiver),
• Time interval schedule - Interval duration Tint, start time Ti and
index of interval i, length of one-way key chain. There is Key
disclosure delay d (number of intervals). A key commitment to the
key chain Ki( i< j−d where j is the current interval index).
CS8088-ADHOC AND WIRELESS SENSOR NETWORKS
ROHINI COLLEGE OF ENGINEERING AND TECHNOLOGY
(B) Broadcasting Authenticated Messages - Each key in the one-way
key chain corresponds to a time interval. Every time a sender
broadcasts a message, it appends a MAC to the message, using the key
corresponding to the current time interval. The key remains secret for
the next d−1 intervals, so messages sent in interval j effectively
disclose key Kj−d.
(C) Authentication at Receiver - When a sender discloses a key, all parties
potentially have access to that key. An adversary can create a bogus
message and forge a MAC using the disclosed key. So as packets arrive,
the receiver must verify that their MACs are based on safe keys: a safe
key is one that is only known by the sender, and safe packets or safe
messages have MACs computed with safe keys. Receivers must discard
any packet that is not safe, because it may have been forged.
10. TESLA Security Considerations
However, given ki, no one can generate ki+1. At i-th time slot, BS sends an
authenticated message MACki (message). Sensor nodes store the message till
the verification key in the (i + 1)- th time slot is disclosed. Sensor nodes verify
disclosed key ki+1 by using key ki as ki
= h(ki+1). In μTESLA, nodes are required to store a message until the
authentication key is disclosed. This operation may create storage problems,
and encourages DoS types of attacks.
μTESLA has been expanded to Multi-level μTESLA by simplifying the key
distribution phase and introducing a new concept of a multi-level key chain
generation using pseudo-random functions that improves the protocol
efficiency. Multi-level μTESLA reduces the need to reinitialize the network
(although re-initialization is still required) by implementing multiple levels of
key chains, in which high-level keys are used to communicate root-keys (or
commitments) for low-level chains which are used in turn for broadcast
authentication as in standard μTESLA.
The chains are further connected in that each root-key is derived from the
corresponding high-level chain using another pseudo-random function.
Network lifetime is extended many times over, but it is still limited. A
problem would result if a receiver dropped a related commitment distribution
message initializing a new low-level chain; it would be unable to verify any
broadcast data received during this entire lifetime of the chain itself. The data
would still be verifiable eventually as the receiver could use any later
commitment distribution message to reconstruct all the lost high-level keys
CS8088-ADHOC AND WIRELESS SENSOR NETWORKS
ROHINI COLLEGE OF ENGINEERING AND TECHNOLOGY
and the corresponding chains. This would require significant computation and
storage.
1. BiBa stands for Bins and Balls signature in which a collision of balls
under a hash function in bins forms the signature. BiBa exploits the
birthday paradox such that the signer has many balls to throw into the
bins which results in a high probability to find a signature, but an
adversary has few balls so it has a low probability to forge a signature.
2. The BiBa protocol is a general solution that can be applied to sign
broadcast data based on one-way functions without trapdoors. The BiBa
signature scheme is efficient, robust to packet loss and scales well to a
large number of receivers.
3. However, the public keys used in the BiBa protocol are large and the
time to generate the signatures is long.
4. The small signature sizes make the BiBa protocol a good candidate for
the system which is to be deployed over a bandwidth constrained
network. Moreover, small signature verification overhead allows the
end devices to be simple and cheap.
5. The sender divides time into periods of equal duration. The sender
then creates t chains of SElf Authenticating vaLues (SEALs), S<1;i>;
:::S<t;i>, and a Salt chain, Ki, associated with time interval i. The SEAL
and Salt chains are of length ‘l’,
hence they last ‘l’ time intervals. The Salt key is used by the sender to create
the SEALs and is required for authentication of SEALs at the receiver. The
SEALs are generated recursively by applying a pseudo-random function F
as follows : S<i;j> = FS<i;j+1>(Kj+1); for (1 <= i <= t) and (1 <= j <= l).
The use of the Salt key forces an attacker to obtain the pre-image of the Salt
CS8088-ADHOC AND WIRELESS SENSOR NETWORKS
ROHINI COLLEGE OF ENGINEERING AND TECHNOLOGY
chain as a pre-requisite to finding the pre-images of the SEAL chains.
Therefore an attacker cannot precompute the SEALs for subsequent time
periods without knowledge of the Salt key.
7. The sender uses the hash function Gh() on the t SEALs and observes any
k-way collisions from distinct SEALs. That is, S<1;i> != S<2;i> != .. !=
S<k;i> such that Gh(S<1;i>) = Gh(S<2;i>).. = Gh(S<k;i>). The k SEALs
that result in a collision form the signature and are then sent together with
the message as (< S1; .. ; Sk > || m).
8. The receiver then authenticates the message if Gh(S1) = .. = Gh(Sk) and
S1 != .. != (Sk). During signature generation, it is possible that Gh()
applied on all t SEALs fails to produce at least k collisions, in which
case a signature cannot be formed. The counter c serves to get a different
hash value h in the event that Gh() fails to produce at least k collisions
from all t SEALs. The receiver is assumed to know the value k, the hash
function H and hash function family G.
Figure below shows the structure of the messages sent by the BiBa
protocol. A description of the structure of the protocol messages sent to
facilitate authentication using BiBa instances is given below. Reference