13.07.2015 Views

Multi-user Broadcast Authentication in Wireless Sensor Networks

Multi-user Broadcast Authentication in Wireless Sensor Networks

Multi-user Broadcast Authentication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

u-DO -Do -f 6636*10leq,'- f = 2.03*-7,f°ie= 4.4210o(C,DO*- C/Do-'-" ;DO-Fig. 4. Maximum supported number of network <strong>user</strong>s with respectto storage limitat least with<strong>in</strong> the lifetime of the WSN (usually atmost several years). However, when mN 64 bits,the adversary is now expected to generate around 244.4public/private key pairs before f<strong>in</strong>d<strong>in</strong>g a valid pair. Theanalysis below shows the time and cost of the attack.To generate a public/private key pair <strong>in</strong> ECDSA-160, apo<strong>in</strong>t multiplication operation has to be performed, forwhich the fastest known implementation speed is 0.21msthrough a specialized FPGA design [14]. Suppose theadversary could afford 100,000 such FPGAs, whichwould cost no less than one million dollars. Then, byexecut<strong>in</strong>g 100,000 FPGAs simultaneously, to generateone valid key pair still takes 13.2 hours roughly. Withthe above analysis, we suggest to select the value of fcarefully accord<strong>in</strong>g to the security requirements of thedifferent types of applications. Given a highly securitysensitive military application, we suggest that f shouldbe no larger than 6.36 * 10-20, i.e., m/N > 92 bits.On the other hand, when the targeted applications areless security sensitive as <strong>in</strong> the civilian scenario, wecan tolerate a larger f. This is because the adversaryis now generally much less resourceful as compared tothe former case.C. Maximum Number of Network Users SupportedIt is important to know how many network <strong>user</strong>s canbe supported <strong>in</strong> BAS so that the WSN can be wellplanned. The follow<strong>in</strong>g theorem provides the answer.Theorem 2: Given the storage space m bits for as<strong>in</strong>gle Bloom filter and the required probability of a falsepositive freq (freq C (0,1)), the maximum number ofnetwork <strong>user</strong>s that can be supported is m (In 2)2, that is,In f,,qN

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!